US6085238A - Virtual LAN system - Google Patents
Virtual LAN system Download PDFInfo
- Publication number
- US6085238A US6085238A US08/844,791 US84479197A US6085238A US 6085238 A US6085238 A US 6085238A US 84479197 A US84479197 A US 84479197A US 6085238 A US6085238 A US 6085238A
- Authority
- US
- United States
- Prior art keywords
- virtual
- network
- local
- virtual group
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4645—Details on frame tagging
Definitions
- This invention relates to a virtual local area network (LAN) related to logical configuration management of a LAN and more particularly to a LAN segmentation system for controlling a traffic flow of a LAN appropriately and using transmission media efficiently for improving the utilization factor of the entire network and a logical configuration management system of a LAN for facilitating management of move, change, addition, etc., of computers.
- LAN virtual local area network
- the invention relates to a virtual LAN (VLAN) for logical segmentation of a network so as to form a structure independent of a physical world so as to be able to change the network dynamically following business structure change of work groups, projects, etc., of organizations including enterprises based on LAN switching technologies.
- VLAN virtual LAN
- the invention relates to priority service and QOS (quality of service) guarantee technique for automatically reconfiguring a network in response to move of terminals, etc., and supporting the transmission quality of a transmission band, delay time, etc., on demand.
- QOS quality of service
- the invention relates to a port segment switching system for setting a common microsegment to a plurality of ports of each switching hub for a plurality of switching hubs.
- the invention relates to a virtual network switching system for mapping logical network segments to physical traffic segments for enabling dynamic reconfiguration.
- the invention relates to a virtual network switching system for enabling customization of network configuration, function, and service to suit the user such as a network administrator of a work group or a department in an environment in which a plurality of servers for providing service making good use of resources of various environmental facilities of an enterprise such as network distributed management and building automation (BA) are distributed over a network.
- a virtual network switching system for enabling customization of network configuration, function, and service to suit the user such as a network administrator of a work group or a department in an environment in which a plurality of servers for providing service making good use of resources of various environmental facilities of an enterprise such as network distributed management and building automation (BA) are distributed over a network.
- BA network distributed management and building automation
- the invention relates to an intelligent building wiring system. It relates to a distributed integrated wiring system for a network for integrating an enterprise network system occupying an important part with communication processing of information communication technology (IT), intelligent building communication, office automation (OA), and BA.
- IT information communication technology
- OA office automation
- a host centralized network with channel connection of online transaction terminals centering on a host computer system combining a database server and an application server with a communication control function has been used mainly as a network of an account system of a financial institution or a business system of an enterprise.
- a client and centralized server network is a paradigm, wherein most employees connect PCs as their own client machines to the network.
- server machines operate as application servers and database servers of packaged application software replacing a host computer as enterprise servers supporting online transaction and distributed database functions in the operating system of a workstation (WS) server or a PC server and are connected on the network for network computing at the enterprise level or globally replacing a conventional host computer.
- WS workstation
- WWW world-wide web
- desktop WWW browsers distributed over the network spring into wide use.
- a database connected to WWW servers can be easily accessed integrally in a GUI (graphical user interface) environment with multimedia of images, data, voice, etc., as an object, thus the demand for the WWW multimedia network is increasing explosively.
- Computers become easy to use and personal owing to operating systems and WWW technologies with an excellent GUI and are connected to a network for all employees to share information and immediately providing information for business efficiency improvement and prompt decision making, thereby enhancing intellectual productivity.
- business application of information communication technologies moves and an enterprise or an enterprise model is becoming a network-type distribution form.
- information communication networking technologies support global enterprise activities like virtual enterprises connected by networks. Expandability and innovation that can deal speedily with change in the enterprise activities are increasingly demanded for the network and information communication technologies.
- high speed and high performance are demanded in addition to reliability, integrity, and economy because all persons working in offices, etc., use networks.
- an RSVP resource reservation protocol
- IP multicasting at the internet level is also developed.
- the RSVP itself is not a routing protocol and operates with unicasting and multicasting routine protocols like an internet control protocol occupying the TCP area on the IP.
- the receiving party issues a transmission quality guarantee (QoS) request.
- QoS transmission quality guarantee
- a packet classifier determines an input packet route and QoS
- a packet scheduler determines forwarding for each packet
- admission control determines whether or not there are sufficient resources to support the requested QoS
- policy control determines whether or not the user is authorized to use the resources.
- the RSVP itself transmits and handles QoS control parameters as opaque data.
- the RSVP is designed to be able to be expanded to a very large member, group, and multicast group having topology of a tree structure according to router "soft state" (use of state transition by software).
- connection-oriented ATM asynchronous transfer mode
- MPOA for providing a multiprotocol router on LAN emulation
- IP-over-ATM for passing the IP on ATM
- IP-over-RSVP for passing the RSVP on ATM
- IP switching system for switching only the IP on ATM
- 1-PNNI 1-PNNI system for routing internet protocols on a private signaling protocol between ATM switches
- QoS ATM-native transmission quality guarantee
- center units of information communication facility machines such as a center line concentrator of LAN and telephones, a BA monitor controller, and electric equipment of a distribution board, etc., in an intelligent building have been gathered at a center of an electric room, etc., under an electric shaft (EPS) to reduce in network maintenance and management costs and provide security.
- EPS electric shaft
- the servers at the enterprise level and important network machines on network management are gathered in the network center and management is centralized in such a manner that a telephone switching system is installed in a switching system room and that a disaster prevention system and a BA central monitor panel are installed in a central monitor room in the building.
- Subcentral units of information communication facility machines such as a floor line concentrator for controlling information communication terminals, a BA monitor controller, and electric equipment for each floor are installed in a wiring closet on each floor together with a floor distribution frame (floor IDF), etc. Generally, they are mounted on a 19-inch rack from which star wiring is installed to outlets on each floor by an advanced wiring system.
- floor IDF floor distribution frame
- the wires of a machine room subsystem from the network center, the switching system room, and the central monitor room are collected as a trunk at a main distribution frame (MDF).
- a trunk line wiring subsystem as a backbone is formed from the MDF to the floor IDF in the wiring closet on each floor and wires from the IDF to the terminals or outlets in the floor make up a branch line wiring subsystem. It is ideal to wire from the distribution frame (IDF) to a wall face or floor outlet with a 4-pair twisted pair line at the shortest distance as star connection.
- the information lines of the trunk line wiring subsystem are housed in the EPS together with a power distribution system extending straight from the bottom floor to the top floor of the building.
- the room through which the EPS passes on each floor becomes the wiring closet, thus here the wiring closet and the electric shift (EPS) are handled the same.
- a room distribution frame (room IDF) is installed in a work group or on a wall face of a room, etc., and wiring is installed with twisted pair lines using multiple twin cable in room IDF units from the floor IDF in the wiring closet to the room IDFs in the work groups.
- the wiring from the floor IDF to the room IDFs becomes a form in which the wiring closet is distributed to the floor, thus here is called a floor trunk line wiring system.
- a room line concentrator for controlling the information communication terminals for each room may be installed in the floor IDF.
- the information terminals such as PCs can be laid out like an island structure in response to desk placement.
- the island is called a zone and a zone wiring system for installing a zone wiring box on the floor is also available.
- Fixed floor wiring is from the floor IDF or room IDF to the zone wiring box and a flexible wiring system is applied from the zone wiring box to a deskside receptacle.
- floor wiring there is an access floor under which wiring is stored and wiring box storage places are provided combining power wiring for supplying power to the information terminals such as PCs and telephone/LAN information wiring.
- LAN wiring there is a type wherein only passive connectors are built in the zone wiring box and a type wherein a repeater HU having a plurality of several active ports is built in as a zone line concentrator.
- Deskside information receptacles include those of a type wherein only passive modular connectors are built in and those of a type wherein a table tap repeater hub having several active ports is built in as a deskside line concentrator.
- Ethernet of collision detection type (CSMA/CD) is often used as a LAN access method that terminals use; in information wiring, as LANs become widespread and the number of terminals increases, the advanced wiring system with twisted pair lines previously used for telephone wiring in USA utilizes a wiring change management function with a cross batch panel of an IDF.
- Twisted pair lines as floor wiring are gathered in a floor line concentrator installed in a wiring closet and the floor line concentrator is provided with a signal repeater function, is connected to a higher-speed trunk LAN, and is provided with a bridge/router function for segmenting network traffic.
- a main router connected to the external internet, a switching system connected to telephone lines, a host computer, a file server, and a center line concentrator connected to a high-speed trunk LAN are installed in a network center.
- the center line concentrator and floor line concentrator are mounted on a so-called 19-inch rack in the chassis form, box form, stack form, etc.
- the repeater, the bridge, the router, and the like are connected to each other as multivendors according to a signal system and communication protocol conforming to the standard.
- Ethernet with twisted pair lines has also been speeded up to 100 Mb/s to 1 Gb/s; the transmission distance with an unshielded twisted pair line (UTP) of the CAT5 grade has become 50-100 m.
- UTP unshielded twisted pair line
- CAT5-grade unshielded twisted pair lines are used from the beginning in expectation of speeding up for the future or incombustible optical fiber wiring fixedly embedded in a wall, etc., enabling longer-distance, higher-speed transmission is also used partially.
- a controller chip of an Ethernet switching system utilizing the high-speed data processing capability of a semiconductor processor is commercially available, and a switching hub with a plurality of ports capable of communicate at a transmission speed of 10 or 100 Mb/s independently at the same time is used as a line concentrator.
- Ethernet switching ports are connected to specific segments in the line concentrator for each port and are filtered based on MAC addresses, they are called port switches or configuration switches; when the ports are filtered to arbitrary segments based on MAC addresses for each port, they are simply called LAN switches.
- the port or configuration switches and the LAN switches are called layer 2 LAN switches.
- connection to the server and connection to the backbone are speeded up.
- An Ethernet switching hub having the capability of appropriately selecting the port transmission speed in response to traffic in such a manner that connection to the server or connection to the backbone is made on a big pipe of 100 Mb/s and that connection to other ports is made at 10 Mb/s is available.
- an Ethernet switching hub having a function of automatically recognizing that the terminal connected to each port is at 10 Mb/s or 100 Mb/s is available.
- a repeater hub at the transmission speed 10 Mb/s, 100 Mb/s is used as a deskside line concentrator or a zone line concentrator to which one to several terminals are connected, a collision scarcely occurs and an area connected to the repeater hub and bridged by switch port is called a microsegment.
- the microsegment is defined locally and is positioned as a subdivided segment in a virtual LAN segment; it is a unit in which several PCs (personal computers) can share media without a collision.
- a configuration switching device microsegments are set in port units and are reconfigured.
- the virtual LAN segment is defined on an upper layer of a LAN system and is common to sites, buildings, and floors covered by network management; the microsegment is defined locally on a low-order layer of a configuration switching device installed in a wiring closet on each floor and is closed in the configuration switching device.
- a single segment of wiring only or repeater connection is between the configuration switching device in the wiring closet and a desktop.
- a backbone of a frame riser with a 100-Mb/s LAN switch installed in a center line concentrator and a LAN switch with a 100-Mb/s interface installed in a floor line concentrator is used.
- QoS transmission quality guarantee
- a backbone of a cell riser with an ATM switch installed in a center line concentrator and a LAN switch with an ATM interface installed in a floor line concentrator is used.
- a main router with an FDDI interface connected to an external system has been installed in a center line concentrator, an FDDI-Ethernet bridge router has been placed in a floor line concentrator, frame conversion between the FDDI and Ethernet has been executed, and segmentation has been made according to a routing protocol.
- a system wherein a main router connected to an external system and a layer 2 LAN switch are installed in a center line concentrator, a layer 2 LAN switch is installed in a floor line concentrator, a backbone is made a single subnet flat for a routing protocol, LAN switch segments are made broadcast domains to form an independent LAN, and segment-to-segment traffic is passed through the main router.
- an implicit VLAN with segments entered in a table as a MAC address group to form implicit virtual LAN segments and an explicit VLAN forming explicit virtual LAN segments with a tag identifiable for each group inserted in a packet are available.
- the switch filtering function can be used to arbitrarily set segments independent of physical wiring across floor line concentrators, enabling segmentation in response to the enterprise organization or work groups.
- a virtual LAN is formed on VPI/VCI connection; transmission quality guarantee (QoS) is not provided in the LAN emulation.
- a switch called a layer 3 LAN switch filtered based on the routing protocol address or the protocol type has been developed for floor line concentrators.
- layer 3 virtual network segments based on logically defined protocol addresses independently of physical wiring like MAC addresses or ports are formed and may be called virtual subnet. Since the layer 3 LAN switch contains a router function, traffic across layer 2 subnets can also be directly switched not via the main router; subnets rather than flat subnets can be classified according to management policy or a fire wall for the routing protocol can be provided for enhancing security.
- the layer 3 LAN switch is formed in an MPOA system on ATM LAN simulation, standardization is not yet complete, thus the layer 3 LAN switch may be installed under specifications proper to each vendor and limited transmission quality guarantee (QoS) is also provided.
- QoS transmission quality guarantee
- a backbone LAN system of routing between ATM switches in an I-PNNI system and using a layer 3 LAN switch as the edge LAN switch is also developed.
- IP switch system or tag switch system on which recent attention is focused is a layer 3 LAN switch on an ATM switch developed uniquely by a LAN vendor for which standardization is proposed by the LAN vendor.
- a comfortable environment is provided for an office so as to cope dynamically with layout change, etc., containing an information network infrastructure like tenant building service of an intelligent building.
- An intelligent building service for providing a residential environment of a layout-free office with a facility network such as BA and an OA/TC network integrated by an information wiring system in units such as workgroups or tenants is provided.
- the network configuration is changed automatically in response to layout change such as a network connection machine move, addition, etc.
- VLAN is used for virtual network service providing a comfortable office environment making free use of IT, and integrated management of service is executed in units. Network segmentation is dynamically changed in response to a network user request. To provide network service for the user, the agent automatically allocates resources in response to a user request.
- the virtual network service using the VLAN provides a comfortable environment integrating the facility network and OA/TC network autonomously in a distributed manner.
- headers or tags for setting different virtual LAN groups for each terminal rather than in port units are added to packets and virtual LAN groups according to the standard or locally defined are used for virtual network service for providing a comfortable office environment integrating the facility network and OA/TC network and making full use of IT.
- unique virtual LAN groups supporting unicast and multicast priority processing for each terminal with no extra header or tag added to a packet and moreover independently of LAN switch ports are used for the already existing terminals in conformity with the conventional standard and automatic configuration management is also executed dynamically when the already existing terminal moves.
- one main router or one route server has borne routing table management in communication between intranet VLANs and communication with the internet.
- intranet packets are speeded up, it becomes necessary to speed up the main router, the traffic amount of the main router increases, and the main router becomes very expensive.
- Virtual network service for customizing a user environment distributed for each residential room unit and using building facilities and information communication facilities by logically forming virtual groups dynamically handling change factors such as user requests and building layout change and appropriately allocating resources and guaranteeing QoS in a virtual network relating the logical attribute to physical attribute.
- a virtual LAN system forming a virtual group which is based on elements having physical attribute or logical attribute and constituting a virtual LAN; setting a client address and priority of the virtual group in a virtual group registration table; and allocating unicast and broadcast traffic bands in group units.
- a virtual LAN system including a virtual group agent having a virtual group registration table and a virtual group learning circuit; wherein the virtual group agent forms a virtual group for each terminal based on characteristics of a packet without adding an extra header or tag to the packet and independently of LAN switch ports, sets a client address and priority of the virtual group in the virtual group registration/routing table, and allocates unicast and multicast traffic bands in group units; and whereby the virtual group agent executes dynamic automatic configuration management for a terminal move by the virtual group learning circuit.
- the virtual LAN system may further includes: a port segment switching system including: one or more switching hubs having a plurality of switching hub ports, a packet being transmitted and received in microsegment units to which the switching hub ports belong; wherein the virtual group of which members are the switching hub ports is formed in such a manner that microsegment units to which the switching hub ports belong function as a virtual repeater; and whereby the switching hub ports are combined arbitrarily so as to set a common microsegment to the plurality of switching hubs.
- a port segment switching system including: one or more switching hubs having a plurality of switching hub ports, a packet being transmitted and received in microsegment units to which the switching hub ports belong; wherein the virtual group of which members are the switching hub ports is formed in such a manner that microsegment units to which the switching hub ports belong function as a virtual repeater; and whereby the switching hub ports are combined arbitrarily so as to set a common microsegment to the plurality of switching hubs.
- the above virtual LAN system may further comprise a plurality of segment patterns of microsegments previously registered in the each switching hub, the segment patterns being selected by time period or in switching hub units, thereby forming the virtual group of the microsegment, the virtual group having ports set by the segment patterns as members thereof.
- a plurality of link paths may be set in each switching hub for daisy-chaining the switching hubs, the virtual group of the microsegments is set to link path, switching hub ports being members of the virtual group, and whereby the virtual group of the plurality of microsegments are multiplexed among the switching hubs.
- a plurality of switching hubs may form a plurality of virtual LANs, the virtual group of the microsegments constituting members of the virtual LANs, switching hub ports being members of the virtual group, and a single microsegment or microsegments as members of virtual members are multiplexed among the switching hubs.
- VLAN-IDs for identifying a plurality of virtual LANs may be set, the VLAN-IDs and segment IDs for identifying the virtual group of microsegments to which ports belong are entered in a VLAN management table, and the segment ID is added to a packet between the switching hubs so as to multiplex a single microsegment or microsegments as members of the virtual members among the switching hubs.
- the local switches for processing routing in virtual LANs as local intranet segments of the virtual LAN system may provided; and a local router switch for filtering packets so as to send only internet segment traffic from the local switches to a main router for processing routing in global internet segments.
- the main router manage network subnets
- a gateway is set in the virtual group registration/routing tables contained in the local switches
- a packet entered in the gateway is encapsulated and forwarded to the main router, whereby the packet can be routed to a different local switch and can take part in a common virtual group from a segment in a different subnet.
- the virtual group agents may have the virtual group registration/routing table in which the different virtual groups in network management and network service are formed in a virtual network into a plurality of segments; and the virtual group agents customize the network management and the network service dynamically in coordination with users in response to user demands.
- connection ports of the virtual groups may be distributed to a plurality of switches distributed over a network; the virtual group registration/routing table and the virtual group agents are placed in the switches in a distributed manner; utilities such as building automation utilities of air conditioning, lighting, security, etc., are segmented into the virtual groups; and the virtual group registration/routing table distributed to the switches is managed dynamically; the virtual group agents coordinate with each other in response to a request for setting a virtual network related to resource use of a different system from the user; thereby executing network service of customizing the utilities and automatic configuration for a user.
- client addresses of the virtual groups and a user environment may be set in the virtual group registration/routing table; the virtual group agents coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc., segment resources of a different system into virtual groups in coordination with a different system management server, and dynamically manage the virtual group registration/routing table distributed to the switches; thereby customizing the linkage conditions of the building automation utilities and the utilities of the different system for automatic configuration.
- connection ports of the virtual groups may be distributed to a plurality of switches distributed over a network; the virtual group registration/routing table and the virtual group agents are placed in the switches in a distributed manner; the virtual group agents coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc., in accordance with constraints and rules of conflict detection/negotiation/plan correction/learning preset for a network environment for the agents so as to dynamically manage the virtual group registration/routing table distributed to the switches; thereby customizing network management and network service and executing automatic configuration thereof.
- connection ports of the virtual groups may be distributed to a plurality of switches distributed over a network; the virtual group agents have three types of agents different in character, virtual network agents, virtual user agents, virtual network service agents; the virtual group registration/routing table and the virtual network agents are placed in the switches in a distributed manner; wherein user environment table and the virtual user agents are placed in the switches or terminals in a distributed manner; virtual network service agents segment resources of a different system into virtual groups and dynamically manage the virtual group registration/routing table distributed to the switches in coordination with virtual network agents and a different system management server; and whereby the virtual user agents and the virtual network agents distributed to the switches coordinate with each other for customizing the utilities of the different system in response to a virtual network setting request related to resource use of the different system from a user for automatic configuration.
- the virtual group agents may have the following three types of agents different in character; virtual network agents, virtual user agents and virtual network service agents; the virtual network agents are placed in the switches in a distributed manner; wherein user environment table and the virtual user agents are placed in the switches or terminals in a distributed manner; virtual network service agents segment resources of a different system into virtual groups and dynamically manage the virtual group registration/routing table distributed to the switches in coordination with virtual network agents and a different system management server; and whereby the virtual user agents and the virtual network agents distributed to the switches coordinate with each other for customizing the utilities of the different system in response to a virtual network setting request related to resource use of the different system from a user for automatic configuration.
- the user environment table and virtual user agents may be placed in the switches or terminals in a distributed manner;
- the virtual network service agent is built in a local network manager of a distributed management system;
- the virtual user agent and the virtual network agents distributed to the switches coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc.;
- the virtual network service agent dynamically manages the virtual group registration/routing table distributed to the switches in coordination with the virtual network agent and a virtual network management server for managing and operating a multivendor virtual network; thereby customizing a multivendor integrated virtual network environment in addition to network management conforming to standard for automatic configuration in the local network manager.
- the user environment table and virtual user agents may be placed in the switches or terminals in a distributed manner;
- the virtual network service agent is built in a local network manager of a distributed management system;
- the virtual user agent and the virtual network agents distributed to the switches coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc.;
- the virtual network service agent dynamically manages the virtual group registration/routing table distributed to the switches in coordination with the virtual network agent and a virtual network management server for managing and operating a multivendor virtual network; thereby customizing a multivendor integrated virtual network environment in addition to network management conforming to standard for automatic configuration in the local network manager.
- the user environment table and virtual user agents may be placed in the switches or terminals in a distributed manner; the virtual network service agent is built in a network management manager for integrated management; the virtual user agent and the virtual network agents distributed to the switches coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc.; the virtual network service agent dynamically manages the virtual group registration/routing table distributed to the switches in coordination with the virtual network agent and a virtual network management server for managing and operating a multivendor virtual network; thereby customizing a multivendor integrated virtual network environment in addition to network management conforming to standard for automatic configuration.
- the user environment table and virtual user agents may be placed in the switches or terminals in a distributed manner; the virtual network service agent is built in a network management manager for integrated management; the virtual user agent and the virtual network agents distributed to the switches coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc.; the virtual network service agent dynamically manages the virtual group registration/routing table distributed to the switches in coordination with the virtual network agent and a virtual network management server for managing and operating a multivendor virtual network; thereby customizing a multivendor integrated virtual network environment in addition to network management conforming to standard for automatic configuration.
- the user environment table and virtual user agents may be placed in the switches or terminals in a distributed manner; linkage conditions of building automation utilities and utilities of a different system are set in a user environment setting area; the virtual user agent and the virtual network agents distributed to the switches coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc., in accordance with constraints and rules of conflict detection/negotiation/plan correction/learning preset for a network environment for the agents; and the virtual network agent coordinates with a virtual network management server for dynamically managing the virtual group registration/routing table distributed to the switches; thereby customizing the linkage conditions of the building automation utilities and the utilities of the different system, autonomously observing the state of each utility, learning an optimum linkage condition for automatic setting thereof.
- the user environment table and virtual user agents may be placed in the switches or terminals in a distributed manner; linkage conditions of building automation utilities and utilities of a different system are set in a user environment setting area; the virtual user agent and the virtual network agents distributed to the switches coordinate with each other in automatic response to a user's network resource use request, a terminal move, addition, change, etc., in accordance with constraints and rules of conflict detection/negotiation/plan correction/learning preset for a network environment for the agents; and the virtual network agent coordinates with a virtual network management server for dynamically managing the virtual group registration/routing table distributed to the switches; thereby customizing the linkage conditions of the building automation utilities and the utilities of the different system, autonomously observing the state of each utility, learning an optimum linkage condition for automatic setting thereof.
- a plurality of virtual LANs of the virtual LAN system are placed in an intelligent building system for executing communication and control used by a resident, such as an office, a plant, a hospital, or a building in a distributed manner; network service resources are distributed to a plurality of residential units into which the intelligent building system is divided, so that service for the resident can be provided autonomously under local conditions meeting local requirements; a local node of each residential unit, into which functions and resources of local network service are integrated, a plurality of local nodes autonomously providing network service; a center node into which common resources and common network service functions required for use of common building facilities, common service, and centralized management of the entire system are integrated; and services of the distributed virtual LANs are integrated in the local nodes and the center node.
- an integrated network service equipment may be installed in the center node, and a distributed network service equipment is placed in the local node; and building wiring comprises: backbone wirings connecting the center node and floor integrated wiring closets; floor trunk lines connecting the floor integrated wiring closets and equipment storage units placed in construction space such as space below a floor that can be accessed from shared space of the building; and floor branch lines connecting the equipment storage units and zone boxes or outlets; wherein the local node is the floor integrated wiring closet or the equipment storage unit.
- a plurality of virtual LANs of the virtual LAN system are placed in an information communication network environment in a distributed manner; residential units to which information communication service functions and resources and building facility service functions and resources required for local network service for a resident are distributed, so that network service for the resident in the information communication network environment in a building such as an office, a plant, or a hospital can be provided autonomously under local conditions meeting local requirements; a local network service server into which network service functions of local information communication service like a virtual network configuration setting a multicast group such as an electronic conference using multimedia or providing virtual common information space different from physical placement through a network and local building facility service like residential environment service such as air conditioning and lighting are integrated; distributed network service equipment into which communication, control, and monitor functions for providing local information communication resources and building facility resources used as resources for providing the local network service and service for a local resident autonomously under local conditions; a common network service server into which common information communication service such as access to an internet, WAN connection, and message communication throughout the
- the integrated network service equipment may be installed in a center node, and the distributed network service equipment is placed in a local node; and building wiring comprises: backbone wirings connecting the center node and floor integrated wiring closets; floor trunk lines connecting the floor integrated wiring closets and equipment storage units placed in construction space such as space below a floor that can be accessed from shared space of the building; and floor branch lines connecting the equipment storage units and zone boxes or outlets; wherein the local node is the floor integrated wiring closet or the equipment storage unit.
- the registration/routing tables and the virtual group agents may be placed in a network in a distributed manner; network service functions of local information communication service and building facility service are integrated into a local network service server; communication, control, and monitor functions for providing local information communication resources and building facility resources and service for a local resident autonomously under local conditions are integrated into a distributed network service equipment; a common information communication service and common building facility service are integrated into a common network service server; common information communication facility resources, common building facility resources, and communication, control, and monitor functions required for use of an entire system, common service, and centralized management are integrated into an integrated network service equipment; local information communication service and local building facility service of building automation utilities, utilities of a different system, etc., common information communication service, common building facility service, and their linkage conditions can be set in a user environment unit or residential room unit setting area of the virtual group registration/routing table; the virtual group agents coordinate with each other in automatic response to a user's network resource use request, a terminal move
- the virtual group agent may comprise virtual network service agent, virtual network agent and virtual user agent; virtual network service agent, virtual group registration/routing tables, virtual network agents, user environment/residential unit environment table and virtual user agents are placed in a network in a distributed manner; network service functions of local information communication service and building facility service are integrated into a local network service server; communication, control, and monitor functions for providing local information communication resources and building facility resources and service for a local resident autonomously under local conditions are integrated into a distributed network service equipment; a common information communication service and common building facility service are integrated into a common network service server; common information communication facility resources, common building facility resources, and communication, control, and monitor functions required for use of an entire system, common service, and centralized management are integrated into a network service equipment; local information communication service and local building facility service of building automation utilities, utilities of a different system, etc., common information communication service, common building facility service, and their linkage conditions can be set in a user environment or residential room unit environment setting area of the table
- FIG. 1 is a block diagram of a VLAN switch using the invention
- FIG. 2 is a drawing to show MAC frame format of a general LAN
- FIG. 3 is a drawing to show formats of a virtual group registration table and a virtual group routing table
- FIG. 4 is a system block diagram of one embodiment of the invention.
- FIGS. 5(a) and 5(b) are image charts of virtual service group
- FIG. 6 is an image chart of switched group
- FIG. 7 is a block diagram of virtual group service
- FIG. 8 is a block diagram of a closed system
- FIG. 9 is a block diagram to show a switching hubof the invention.
- FIG. 10 is an illustration to show a segment management table in the switching hub in the invention.
- FIG. 11 is a block diagram to show a switching hub of the invention.
- FIG. 12 is a block diagram to show a switching hub of the invention.
- FIG. 13 is a block diagram to show a switching hub of the invention.
- FIG. 14 shows a schematic diagram of a system configuration
- FIG. 15 is a block diagram to show a system configuration of the invention.
- FIG. 16 is a schematic diagram of the system configuration
- FIG. 17 is an illustration to show a general LAN MAC frame format
- FIG. 18 is a system block diagram of the invention.
- FIG. 19 is a system block diagram of the invention.
- FIG. 20 is an illustration-to show the format of a virtual group registration/routing table of the invention.
- FIG. 21 is a system block diagram of the invention.
- FIG. 22 is a system block diagram of the invention.
- FIG. 23 is an illustration to show the format of a virtual group registration/routing table in the fifth embodiment of the invention.
- FIG. 24 is an illustration to show the format of a virtual group registration/routing table of the invention.
- FIG. 25 is a system block diagram of the invention.
- FIG. 26 is an illustration to show the format of a virtual group registration/routing table of the invention.
- FIG. 27 is a system block diagram of the invention.
- FIG. 28 is a system block diagram of the invention.
- FIG. 29 is a system block diagram of the invention.
- FIG. 30 is a system block diagram of the invention.
- FIG. 31 is a block diagram of a local packet switch in the invention.
- FIG. 32 is a system block diagram of the invention.
- FIG. 33 is a block diagram of a local ATM packet switch in the twelfth embodiment of the invention.
- FIG. 34 is a conceptual block diagram to show a configuration example of the invention.
- FIG. 35 is a block diagram of a switch of the invention.
- FIG. 36 is an illustration to show the structure of a client definition table of the invention.
- FIG. 37 is a block diagram of a network system of the invention.
- FIG. 38 is an illustration to show the structure of a virtual group registration/routing table of the invention.
- FIG. 39 is a conceptual block diagram to a configuration example of the invention.
- FIG. 40 is a conceptual illustration of roles/characters and function of agents of the invention.
- FIG. 41 is an illustration to show the structure of another virtual group registration/routing table of the invention.
- FIG. 42 is a conceptual system block diagram of agents of the invention.
- FIG. 43 is a conceptual block diagram to a configuration example of the invention.
- FIG. 44 is an illustration to show the structure of a virtual network service table of the invention.
- FIG. 45 is a block diagram of a network system of the invention.
- FIG. 46 is an illustration of positioning of virtual network service in the invention.
- FIG. 47 is an illustration of virtual groups and an user environment
- FIG. 48 is a block diagram of a switch of the invention.
- FIG. 49 is a block diagram of a switch of the invention.
- FIG. 50 is an illustration to show the structure of a virtual group registration/routing table of the invention.
- FIG. 51 is an illustration to show the structure of a user environment table of the invention.
- FIG. 52 is a system block diagram of the invention.
- FIG. 53 is an enlarged view of the main part in the invention.
- FIG. 54(a) is an illustration of the main part of a center node in the invention and FIG. 54(b) is an illustration of the main part of a local node in the invention;
- FIG. 55 is an illustration of an actual wiring structure in the invention.
- FIG. 56 is an exploded perspective view of the main part in the invention.
- FIG. 57 is a plan view of the actual wiring structure in the invention.
- FIG. 58 is a detailed block diagram of the system of the invention.
- FIG. 59 is a detailed block diagram of distributed network service equipment in the invention.
- FIG. 60 is a detailed block diagram of integrated network service equipment in the invention.
- FIG. 61(a) is an illustration of a virtual group registration/routing table in the invention and FIG. 61(b) is an illustration of a client definition-table in the invention;
- FIG. 62 is a system block diagram of the invention.
- FIG. 63 is an operation illustration when virtual group agents are used in the invention.
- FIG. 64 is an illustration to show the relationship between virtual groups and user environment in the invention.
- FIG. 65 is a detailed block diagram of distributed network service equipment using a packet switch in the invention.
- FIG. 66(a) is an illustration of a virtual group registration/routing table in the invention
- FIG. 66(b) is an illustration of a user environment table/residential unit environment table in the invention
- FIG. 66(c) is an illustration of a virtual network service table in the invention.
- FIG. 1 shows a LAN switch having an important role in a virtual LAN in a first embodiment of the invention.
- the virtual LAN of the invention forms a virtual group for each terminal according to client addresses in a packet without adding an extra header or tag to the packet of a frame format in conformity with a standard as shown in FIG. 2 and independently of LAN switch ports.
- the client address represents a feature set of a MAC address determined by a medium access method of LAN, a network address determined by a network operating system or communication protocol, an application address defined by application software or the user.
- a virtual group identification section 1 collates a pair of client addresses (1) and (2) of a destination and a source of a packet with a virtual group registration table 2 of a virtual group agent VGA, identifies a virtual group containing both the client addresses, and when input ports 41 . . . differ although a client address match is found as a result of the virtual group identification for a terminal move, outputs a port change message to a virtual group learning section 3 of the virtual group agent VGA.
- the virtual group learning section 3 executes dynamic automatic configuration management for a terminal move.
- the virtual group learning section 3 updates the virtual group registration table 2 provided in a virtual group agent VGA and executes dynamic automatic configuration management.
- the virtual group registration table 2 is provided for each group. As shown in FIG. 3, the priority for each virtual group and client address can be set.
- a virtual group control section 6 in the virtual group agent VGA allocates a band of each traffic type of unicast, multicast, and broadcast in group units in response to the virtual group priority.
- the virtual group control section 6 causes a forwarding section 5 to transfer a packet to a-specified output port 71 . . . by scheduling control.
- a virtual group routing table 8 provided in the virtual group agent VGA enters the optimum connection port address indicating which port of LAN switches distributed over the LAN the virtual group is connected to. It is prepared for each virtual group.
- the virtual group routing table 8 shown in FIG. 1 has a similar structure to that of the virtual group registration table 2 for virtual group identification and virtual group learning.
- the virtual group routing table 8 can be defined as the same structure as the virtual group registration table 2 as shown in FIG. 3, and they can be brought together on installation.
- the optimum connection port address is entered in the virtual group routing table 8 of the structure in FIG. 3 as the routing connection port. That is, in the distributed LAN switch configuration, another LAN switch is cascaded to a port of one LAN switch, thus the connection port to which a LAN switch is connected becomes a port name corresponding to the optimum route leading to the home switch to which the terminal is connected.
- the virtual group identification section 1 When ports differ although a client address match is found as a result of the virtual group identification for a terminal move, the virtual group identification section 1 outputs a port change message, the virtual group learning section 3 sends a topology change message to a virtual group distributed management section 9, which then learns in response to the topology change and dynamically updates the virtual group routing table 8.
- the virtual group identification section 1 of each LAN switch collates input port 41 . . . and the packet source address with the virtual group registration table 2 and detects topology change such as a terminal move, and the virtual group learning section 3 automatically updates the virtual group registration table 2 and the virtual group routing table 8.
- the virtual group distributed management section 9 as virtual group agent dynamically manages the virtual group registration tables 2 and the virtual group routing tables 8 distributed over the LAN switches in cooperation with other LAN switches based on topology change detection of a terminal move, a LAN switch move, etc., whereby virtual groups can be shared among the LAN switches of the network.
- Virtual group agents VGA distributed over the LAN switches can also be installed in virtual group servers each acting as a representative in virtual group units or for a virtual group cluster.
- the virtual group server can manage the state of the virtual group agent VGA and mediate communication between the agents VGA and also dynamically manages the virtual group registration tables and the virtual group routing tables in cooperation as a VLAN switch agent function.
- the virtual group registration tables and the virtual group routing tables updated and managed in the virtual group server are cached in the distributed LAN switches and the virtual group sever distributes change information in the tables to the LAN switches.
- a packet from input port 41 . . . is stored in an area of a buffer 11 specified by a buffer management section 10 and at the same time, the buffer management section 10 generates a pack pointer pointing to the storage location of the packet.
- the packet pointer is stored in a virtual group queuing section 12a of a buffer pointer queuing table 12 for queuing the virtual group only with the pointer without moving the data in the buffer 11.
- the packet is a broadcast packet, its packet pointer is stored in a broadcast queuing section 12b. Further, if the packet contains a unicast address and does not correspond to any virtual group, the pointer pointing to the storage address of the packet in the transmission buffer is queued on an unknown group queuing section 12c.
- the virtual group control section 6 When the virtual group control section 6 detects the port state of output ports 71 . . . and finds an output port 71 . . . idle, it instructs the forward section 5 to send the packet.
- the forwarding section 5 reads the pointer of the specified packet from the buffer 11 and sends the packet data in the buffer 11 pointed to by the pointer through the idle output port 71 . . .
- the virtual group control section 6 uses a priority processing timer (not shown) in the virtual group control section 6 and forwards the packets in the virtual group queuing order at short time intervals according to the virtual group priorities.
- virtual groups for executing communication of video information, etc. with much traffic are given high priority; virtual groups for online system transaction, feedback control, etc., even with low traffic for which reliable message transmission within the permissible time is required are also given high priority.
- the timing interval of processing of packets of virtual groups with low priority in batch processing, file transfer, etc., is the longest; the buffer 11 is scanned in a shorter period for virtual groups with higher priority and the packet of the virtual group with the highest priority is handled first.
- the packet assigned high priority is forwarded within the permissible time set in the priority processing timer by the virtual group distributed management section 9 after the data is input.
- the following three types of virtual groups are formed according to client addresses and virtual groups different in definition method of protocol layer, etc., can be operated solely or be mixed:
- VLAN group at third layer level of OSI protocol layer model with a plurality of network addresses depending on communication protocol or network operating system defined as client address;
- the configuration in (1-1) is called a second-layer LAN switch, that in (1-2) a third-layer LAN switch, and that in (1-3) a custom LAN switch.
- the virtual groups are identified in the order of virtual custom group, virtual network group, and VLAN group as the custom LAN switch. Operation as the third-layer LAN switch in the virtual network group order or as the second-layer LAN switch for identifying virtual groups only with MAC addresses is performed according to the installation state or selection.
- the network address and the user-defined address are blank in the second-layer LAN switch
- the user-defined address is blank in the third-layer LAN switch
- all of the MAC address, network address, and user-defined address are specified in the custom LAN switch.
- a port change message is output.
- the virtual group learning section 3 performs different operation depending on whether or not the home switch of the terminal is changed. If no home switch change is made, the virtual group learning section 3 updates the home switch port in the virtual group registration table 2, thereby executing dynamic automatic configuration management. If home switch change is made, the virtual group distributed management section 9 of a new home switch to which the terminal is moved exchanges a virtual group management message for updating the home switch name and the home switch port in each of the virtual group registration tables 2 of other LAN switches.
- the LAN switch S contains the virtual group routing table 8 for each virtual group and the buffer pointer queuing table 12. Since another LAN switch is cascaded to a port of one LAN switch in the distributed LAN switch configuration, a plurality of virtual groups and a plurality of terminals are assigned for each port and the LAN switch to which each terminal is directly connected is the home switch of the terminal and the terminal is connected to a port of the home switch.
- the home switch name in the virtual group routing table 8 of the LAN switch is the switch name of the terminal. If the terminal is not directly connected to one LAN switch, the home switch name differs and the routing connection port in the virtual group routing table 8 is the port name corresponding to the optimum route leading to the home switch to which the terminal is connected.
- the virtual group distributed management section 9 of a new home switch to which the terminal is moved exchanges a virtual group management message for updating the home switch name and the home switch port in each of the virtual group registration tables 2 of other LAN switches.
- the virtual group distributed management section 9 of a LAN switch adjacent to the home switch updates the routing connection port and client distance in the virtual group routing table 8 and sends a virtual group management message to another adjacent LAN switch for providing update information of the virtual group registration table 2 and the virtual group routing table 8 accompanying the topology change.
- the LAN switch When receiving the virtual group management message, the LAN switch updates the virtual group registration table 2 and the virtual group routing table 8 of the LAN switch according to the update information of the virtual group registration table 2 and the virtual group routing table 8 accompanying the topology change, and sends the virtual group management message to other LAN switches in sequence for updating the virtual group registration table 2 and the virtual group routing table 8, thereby learning for the terminal move and dynamically updating the virtual group routing table 8.
- the virtual group distributed management section 9 exchanges a management message with other LAN switches as virtual group agent for exchanging LAN switch management information such as the MAC addresses and virtual groups of the LAN switches, thereby entering the connection port leading to the optimum routing path with a minimum number of LAN switch repetition stages for each LAN switch in the routing connection port of the virtual group routing table 8 of each LAN switch and setting the priority processing timer of scheduling responsive to the number of LAN switch repetition stages to provide the delay time for priority processing.
- the virtual group control section 6 selects an optimum routing path between ports in each virtual group and forwards a packet by setting the priority processing timer. Thus, the delay time of a packet with high priority is provided.
- the virtual group distributed management section 9 updates the routing connection port and the client distance in the virtual group routing table 8 by transferring a virtual management message in sequence between the adjacent LAN switches.
- forwarding processing to ports is performed in sequence based on the virtual group routing table set by the virtual group distributed management section 9.
- the packet is forwarded to the previously learned port.
- a broadcast packet and a packet with a destination address not contained in the table are output from a switch domain, thus are multicasted to all ports.
- the agent of the home switch of the terminal updates the virtual group registration table 2 and the virtual group routing table 8.
- general LAN application is a client-server model wherein a plurality of clients share a database in the server; multiple access to the database is made in online transaction processing of account-system jobs.
- the delay time introduces a problem because of synchronization.
- High-speed communication and small delay time are required for data extraction (query) to grasp, analyze, and simulate information and support decision making and for dataware houses which want to know the result as early as possible interactively.
- data extraction query
- a larger amount of data needs to be sent in small delay time.
- high priority is applied and the data amount increases.
- a virtual corporation via WAN requires server-to-server communication at remote sites and electronic commerce needs to interactively communicate with a large number of terminals at remote sites. Monitor control messages for maintaining and managing the network must be handled at the highest priority.
- FIG. 4 is a system block diagram of a network using the virtual LANs of the invention.
- a plurality of LAN switches S1 . . . each comprising virtual group agent VGA shown in FIG. 1 are distributed, and terminals A1 . . . , B1 . . . , and C1 . . . connected to the LAN switches S1 . . . belong to different virtual groups.
- VLAN group second layer level
- NIC network interface card
- FIG. 4 shows communication with the terminals A1 . . . , B1 . . . , and C1 as one virtual group for simplicity.
- FIG. 5(a) shows that client U belongs to virtual groups VA, VB, and VC and are connected to different server A, B, or C depending on the application or project.
- FIG. 5(b) shows that clients U1 . . . belonging to virtual groups VA, VB, and VC are connected to server S common to the virtual groups VA, VB, and VC.
- FIG. 6 represents VLAN groups (second layer level) as switched domains SA, SB, and SC and a wall for communication among the switched domains SA, SB, and SC and broadcast as routing service between switched domains LS, and shows placement of network service server N and network management server M among the switched domains SA, SB, and SC.
- FIG. 7 shows the concept of the virtual group service.
- Each of distributed LAN switches Sa . . . comprises virtual group agent VGA and the virtual group agents support the virtual group dynamically in cooperation.
- virtual group registration tables 2 and virtual group routing tables 8 provide dynamic virtual group configuration for the optimum routing and a terminal move as shared table TB.
- the virtual group agent VGA of each of the LAN switches Sa . . . in FIG. 7 comprises virtual group learning section 3, virtual group registration table 2, virtual group routing table 8, virtual group distributed management section 9, and virtual group control section 6 as important components, as shown in FIG. 1.
- a port change message extraction function in the virtual group control section 6 also becomes an important component.
- the virtual group identification section 1 codes client addresses (1) and (2) together by a hash function and collates the hash function with the virtual group registration table 2 coded by hash functions, so that an increase in the delay time does not introduce a problem as compared with the format of adding a header or tag to a packet.
- the virtual group identification section 1 of the LAN switch S collates a pair of MAC addresses 1 and 2 of the packet destination and source with the virtual group registration table 2 and identifies a virtual group containing both the MAC addresses.
- the virtual group identification section 1 of the LAN switch S collates a pair of network addresses (1) and (2) of the packet destination and source with the virtual group registration table 2 and identifies a virtual group containing both the network addresses.
- the virtual group identification section 1 collates a pair of application addresses (1) and (2) of the packet destination and source with the virtual group registration table 2 and identifies a virtual group containing both the application addresses.
- the client name is entered in the virtual group registration table 2 of the format shown in FIG. 3. Different client names can also be entered for each VLAN group, each virtual network group, and each virtual custom group. If a VLAN group, virtual network group, and virtual custom group are defined for one MAC, VLAN group definition rows, virtual network group definition rows, and virtual custom group definition rows are contained in the virtual group registration table 2.
- the virtual group identification section 1 collates addresses with the virtual group registration table 2 in the order of the virtual custom group definition rows, the virtual network definition rows, and the VLAN group definition rows.
- the machine type is also entered in the client name so that the client name is also the identification code of the machine type such as LAN switch, terminal or the like.
- the virtual group distributed management section 9 enters the MAC address directly connected to a port of the LAN switch or indirect connection in a switch connection map 9a.
- connection map information of the entire network is provided by using the virtual group registration table 2 and the switch connection map 9a in combination. Since connection of adjacent ports is seen, topology is drawn on a connection relation chart, which is called a map. If topology is a tree structure, route search is easy to make. If topology is meshes, distances of routes as transmission time need to be compared. If LAN switches having the same transmission speed are connected at multiple stages, the number of stages is assumed to be the distance. For example, how many paths from terminal A1 to terminal A9 exist is reflected in the numeral in the client distance of each terminal in each virtual group routing table 8.
- the configuration of the forwarding section 5 depends on the switch configuration method. Most of known systems adopt a shared high-speed parallel bus; the band width of the bus is set to about twice the sum total of port transmission bands and the configuration is often used for a chassis-type back plane. In a parallel configuration with a crosspoint switch, input buffer type, output buffer type, and the like are available. Since the buffer 11 is a shared memory, the entire configuration of the LAN switch in FIG. 1 is buffer sharing type (store and forward switching type), but the above-mentioned switching methods can be used in combination for the forwarding section 5.
- Check sum in the frame format in FIG. 2 is not executed, whereby the LAN switch S can be operated as cut-through type.
- the operation mode of the LAN switch S namely, the store and forward switching type for executing check sum or the cut-through type for executing no check sum can be defined in the group type in the virtual group registration table 2.
- the cut-through type enhances the throughput of the LAN switch S, but cannot filter a defective packet.
- the priority set in the virtual group registration table 2 takes precedence over the operation mode of the switch.
- the packet transmission delay time varies depending on how ports are idle in each LAN switch S and the queuing wait time. Thus, it is necessary to insure the transmission time in cooperation as a system.
- a virtual group management message is exchanged between the virtual group distributed management sections 9.
- network management protocols such as SNMP (RFC1157: Simple network management protocol) for managing each device on a subnetwork based on MIB (management information base) and RMON (RFC1271: Remote monitoring) for managing the entire subnetwork are exchanged between a network management protocol agent 13 and an external network manager for supporting the industry standard such as collection of statistical information.
- SNMP Simple network management protocol
- MIB management information base
- RMON RRC1271: Remote monitoring
- virtual group information is added to packets or packets are classified according to information of subnet addresses, etc., of a third-layer protocol of OSI protocol layer model, and the LAN switch S references the information. It is intricate to change subnet setting, etc., in router segmentation; network management and maintaining costs introduce a problem that cannot be bypassed in a system involving change of close to 30 percent of terminals for a year.
- VLAN groups of the invention for registering virtual groups only with MAC addresses are intended for priority processing, learning load distribution, and raising of routing efficiency.
- priority processing for example, priorities are assigned in the order of a management group, a time critical group insuring the delay time, a switch control group for updating registration tables dynamically, high-speed terminals, and low-speed terminals requiring no priority processing from high to low.
- SNMP or RMON network management is set in the management group.
- the management group and time critical group with high priority are registered statically and the switch control group, high-speed terminals, and low-speed terminals requiring no priority processing are registered after dynamic learning.
- the client address is defined with a pair of destination and source addresses for identifying a specific one of the virtual groups VA . . .
- one client can belong to a plurality of VLAN groups at the second layer level for a plurality of servers A . . . with a single MAC address.
- one client belongs to a plurality of virtual groups VA . . .
- NIC server network interface card
- Network service server N shown in FIG. 6 or virtual network service server VN shown in FIG. 7 manages the agents of the LAN switches S1 . . . (Sa . . . ) and communication with other networks of different systems outside the virtual group.
- the virtual group agents VGA of the LAN switches S1 . . . (Sa . . . ) exchange a virtual group management message with each other for managing the terminals A1 . . . , B1 . . . , and C1 . . . in cooperation.
- a virtual group management message is also exchanged between the network service server N or virtual network service server VN and the virtual group agents VGA of the LAN switches S1 . . . (Sa . . . ) for constructing shared table TB as shown in FIG. 8 for forming a cooperation virtual group and supporting communication of the virtual group with an external system.
- the shared table TB contains the virtual group registration tables 2 and the virtual group routing tables 8 in FIG. 1.
- the network service server N can also manage the virtual group registration tables 2 and the virtual group routing tables 8, in which case the network service server N collates a lookup table cached in the LAN switch S with a client address.
- broadcast from server A . . . can also be transmitted to the entire virtual group in server-to-server connection.
- a virtual service corresponding to the virtual group VA can be received at only the terminals belonging to the virtual group VA.
- Broadcast delivered to clients is limited to the virtual group VA . . . and the network service server N follows unknown group broadcast from clients in cooperation with the virtual group server A . . .
- the virtual group server A . . . sees the protocol type of packet and delivers the broadcast to a specific network service server N or virtual group server A . . .
- the network service server N sets a new virtual group.
- M in FIG. 6 denotes a network management server and SA . . . denotes a switched domain.
- the LAN switch S1 . . . stores a multicast message packet pointer in the virtual group queuing table for multicast and executes multicast processing, whereby the LAN switch S1 . . . supports the multicast of virtual group VA . . . in cooperation with server A . . . in each virtual group VA . . .
- the LAN switch S1 . . . may have a server function.
- the LAN switch operating as a VLAN group at the second layer level routes broadcast for virtual group VA . . . , but depends on external router LT for communication with other than the virtual group VA . . .
- the virtual group is formed based on characteristics of a packet without adding an extra header or tag to the packet and independently of LAN switch port.
- the port or tag as the client address of the virtual group based of the characteristics of a packet.
- Tag indicates VLAN segment as the group name to be a subject of the priority processing, not the destination address.
- tag switch of Cisco Systems, Inc. includes the identification code for high-speed table lookup in the flow label area of IPv6 of layer 3 which flow the packet with cut-through, or in the VCI area of ATM of layer 2.
- Tag shows a flowing path with cut-through and a standardization of IETF is proposed.
- tag of IEEE802.1Q corresponds to VLAN-ID tag
- tag of Cisco Systems, Inc. means tag information on the lookup table inside of the tag switch for cut-through.
- these tags correspond to the logical address of the layer 3 and physical address of the layer 2.
- port and tag means "port address and tag in coordination with standard”.
- the user-defined address in the virtual group registration table and the virtual group routing table in FIG. 3 is an address which is set at the application level, and corresponds to MAC address, home switch and home switch port on the above tables.
- VLAN-ID or identification information to be cut-through is located in the header of the switching tag in layer 2 and layer 3. If these informations are called "tag name", the tag name corresponds to the virtual group name. Accordingly, tag header includes priority information, and the actual switch includes the lookup table which make the tag name as same in the virtual group registration table and the virtual group routing table correspond to MAC address, home switch and home switch port. The swith can also cope with the tag in coordination with standard.
- the port as the client address member can be denoted by the sign for identifying the port such as P1 to P8 in FIG. 10. They are often called merely "port” or "port number".
- the port is managed on a segment management table inside the switch by the only port number as shown in FIG. 10. It seems that the combination of sign for identifying the switch (home switch), and port number (home switch port) corresponds to the port address in view of the other switch or management machine.
- the first embodiment relates to a basic function of the virtual LAN.
- FIG. 9 is a block diagram of a switching hub in a second embodiment, which can be adopted to the virtual LAN system according to the present invention.
- Various devices such as computers and LAN connection machines, are connected to four ports P1-P4 for forming a LAN.
- the access method to the LAN is CSMA/CD and the transmission line specification is 10BASE-T, 100BASE-TX, or the like.
- a reception signal received at a reception section 1181-1184 of each port P1-P4 passes through a data input control section 109 and a clock component is removed by a transmission line decoding section 111 for extracting a data component.
- This extracted data component is sent to a filter control section 110 as input data of a reception packet.
- the filter control section 110 controls broadcast or multicast filtering and if the destination address of the input data is broadcast or multicast, determines whether or not the input data is to be transferred to another microsegment.
- the input data filtered by the filter control section 110 is temporarily stored in a buffer 102.
- the address of the storage location of the data in the buffer 102 is specified by a buffer control section 102a.
- the data in the buffer 102 is transmission line coded by a transmission line coding section 103 and is sent to a data output control section 107 from which the resultant data is transferred to the port P1 . . . specified by a switch control section 104.
- a segment management section 101 has a segment management table. Tb1 as shown in FIG. 10 for indicating and managing which microsegments S1-S14 each port P1-P4 belongs to (which microsegments S1-14 each port is a member of). That is, in the switching hub, a packet is transmitted and received in microsegment S1 . . . units and common microsegments S1 . . . are set in any desired combination in port P1 . . . units and are shared among switching hubs without referencing the network addresses of the devices connected to the ports P1 . . . (MAC addresses, IP addresses, etc., assigned to a network interface for accessing the network).
- the segment management section 101 indicates and manages which microsegments S1 . . . each port P1 . . . belongs to, whereby the switching hubs share the microsegments S1 . . . and the switching control section 104 of each switching hub broadcasts a packet to the ports P1 . . . belonging to each microsegment S1 . . . without specifying the port P1 . . . as the destination address of the packet.
- the switching hub itself is a member of the microsegments S1 . . . , but specification of which switching hub the port P1 . . . belongs to is not made as the switching hub at the port P1-P4 level and which switching hub . . . exists at which port P1 . . . is not significant either. That is, it is necessary to indicate which microsegments S1 . . . exist for each switching hub and which ports P1 . . . are set as members of each microsegment S1 . . .
- microsegments S1 . . . are managed by the segment management section 101 as common segments among the switching hubs and are formed by the switch control section 104.
- Wiring topology with the microsegments S1 . . . set in any desired combination for each of distributed switching hubs is formed as a physical layout.
- the function of the upper-level process is executed by the segment management sections 101 and the switch control sections 104 of the switching hubs in cooperation. Packets are transmitted and received between the ports P1 . . . of the switching hubs registered as members of the microsegments S1 . . . as if they were virtual repeaters sharing media.
- the segment management sections 101 of the switching hubs need to exchange attribute information of common microsegments S1 . . . with each other according to a segment management protocol of a kind of an upper-level process.
- segment ID information together with each packet must be exchanged in some form.
- the switch control section 104 delivers packet data in response to the segment management table Tb1. That is, in one microsegment S1 . . . , a packet is broadcasted to the ports P1 . . . of members as if each switching hub were a virtual repeater.
- a transmission enable signal indicating that the port P1 . . . of the output destination is ready to transmit is input to the data output control section 107 from a collision signal control section 106, the packet is sent from the data output control section 107 to the port P1 . . . of the output destination, as described later.
- one port P1 . . . can be set multiply as members of a plurality of microsegments S1 . . .
- the switch control section 104 references the segment management table Tb1 and broadcasts input data to all microsegments S1 . . . to which the port P1 . . . to which the input data is input belongs. For example, input data to the port P1 set as members of two microsegments S3 and S8 is transferred to all other ports belonging to the microsegments S3 and S8, P2 (member of microsegment S3) and P3 (member of microsegment S8).
- Such operation of the switch control section 104 is realized by a general microprocessor; it can also be accomplished by sequence control by a reprogrammable logic controller with a truth value table referencing the segment management table stored in a rewritable memory.
- priority can be set in the segment management table Tb1 as an attribute of each microsegment S1-S14, and a priority processing control section 108 is provided for controlling the operation of the switch control section 104 along a priority processing schedule in response to the priority.
- a program for delivering packets in the order of the ports P1 . . . processes a plurality of packets output from the same port P1 . . . according to the priority assigned to the packets from high to low.
- a program for delivering packets in the order of the microsegments S1 . . . processes the microsegments S1 . . . according to the priority assigned to the microsegments S1 . . . from high to low.
- the wait time is prolonged, data of a microsegment S1 . . . even with low priority is handicapped and is assigned pseudo high priority for processing.
- the segment management section 1 assigns priority to each microsegment S1 . . . and the priority processing control section 108 controls the switch control section 104 for performing priority processing common to the switching hubs among the microsegments S1 . . . , as described above.
- optional added service can be set in response to the priority.
- the priority processing control section 108 has a priority processing lookup table consisting columns of microsegment numbers S1 . . . , port numbers P1 . . . , priority, and added service. In routing added service of an added service processing task, according to an added service lookup table of addresses, switching hubs, and ports P1 . . . , for example, port P1 . . .
- microsegment S2 which has a large traffic amount or needs to shorten the delay time is registered as a member of microsegment S2 . . . with high priority, and only packets of the microsegment S2 . . . with high priority are routed based on the network addresses rather than broadcasted to microsegments S3 . . .
- a routing table is referenced only for the microsegment S10, and direct communication with the ports P1 connected to devices of specific terminals, etc., is executed preferentially. As a result, multicasting to ports P1 . . . not related is not executed. In this case, a virtual address learning section, address learning table (routing table), and forwarding section common to the switching hubs are required.
- the addresses are referenced only for the microsegment S10 with high priority, the objects are limited to the switching hubs and ports P1 . . .
- Port transmission/reception enable/disable control for thus controlling whether or not transmission/reception is enabled for each port P1-P4 is performed by collision detection control sections 1051-1054 of the ports P1-P4, the collision signal control section 106, the data input control section 109, and the data output control section 107 for avoiding a data collision or congestions in the microsegments S1 . . . ; effective use of the bands can be made.
- the collision detection control sections 1051-1054 output a carrier signal or a jam signal when reception is disabled, and output a silent when reception is enabled. If the collision detection control section 1051-1054 does not output a carrier signal or a jam signal, the collision signal control section 106 enables data to be output from the data output control section 107 to the port P1 . . . containing the collision detection control section 1051-1054. Therefore, when a carrier signal is detected from a reception signal in the collision detection control section 1051 . . . of each port P1 . . . , the corresponding port P1 . . . does not transmit a packet. When the collision detection control section 105 detects a collision with another carrier signal during the transmission, it transmits a jam signal.
- the ports P1-P4 are provided with retiming clock extraction sections 1191-1194, respectively, for extracting a clock from a reception signal, conforming to the standard required for interconnection, such as retiming of a clock at the transmission time.
- the collision signal control section 106 sends a transmission enable signal to the data output control section 107 and a reception enable signal to the data input control section 109 and at the same time, port state signals from the collision detection control sections 1051-1054 of the ports P1-P4 are input/output and the input/output timing of signals from the ports P1-P4 is adjusted, thereby providing the port transmission/reception enable/disable control.
- control logics are executed by performing multicast control for each microsegment based on a truth value table of combinations with the state of the sections such as the presence/absence of a collision of each port P1-P4, presence/absence of transmission state, and presence/absence of reception state.
- a network management agent 112 is provided with a segment control API (application programming interface) section 113 so that microsegments can be set and changed dynamically from application software, etc., in microsegment units common to the switching hubs. That is, the ports P1 . . . can be assigned to the microsegments with high priority in response to user's demand by using external network management software or application software under the network operating system of the server, etc., through the segment control AP1 section 113. Alternatively, a server can be dynamically added only to the microsegments with high priority as added service. Further, routing-between the microsegments of port segment switch of the invention can be executed as external router application through the segment control API section 113.
- segment control API application programming interface
- the switching hub of the embodiment comprises an expansion port (high-speed port) P' serving as a big pipe for sever connection and backbone connection, as shown in FIG. 1.
- 111', 105', 117', 118', 119' respectively denote transmission line coding section, collision detection control section, transmission section, reception section and retiming clock extraction section of the expansion port P'.
- a speed change control section 115 is provided for synchronizing the transmission speed between the high-speed expansion port P' and other ports P1-P4 (low-speed ports).
- the speed change control section 115 temporarily stores data in the buffer 102 in conversation with the buffer control section 102a, lessens the transmission wait time of the low-speed ports P1-P4, and controls the timing so as to avoid a reception overflow.
- the microsegment information is closed in the switching hub and is not propagated to the outside from the expansion port P', but an extra header, etc., not conforming to the standard is not added to the packets input/output to/from the expansion port P', thus interconnection to a standard high-speed LAN machine can be made.
- expansion port access in the switching hub is set in the segment management table Tb1 as a segment attribute.
- the reception packets of the microsegments assigned the expansion port access attribute (for example, microsegments S2, S3, . . . ) are sorted by the reception packet segment sort section 116 and other microsegments not assigned the expansion port access attribute become local microsegments in the switching hub.
- FIG. 11 is a block diagram to show a switching hub in a third embodiment of the invention, which can be adopted to the virtual LAN system according to the present invention. Parts identical with or similar to those previously described with reference to FIG. 9 are denoted by the same reference numerals in FIG. 11 and will not be discussed again.
- the switching hub in the third embodiment is characterized by the fact that a filter control section 110 is followed via a transmission line coding section 103 by a bus-to-bus bridge control section 120, followed by a plurality of segment share buses 121 and that input packets are stored in a buffer and then microprocessor software, a programmable logic controller, and the like perform combination logic and sequence control based on a truth value table, thereby performing communication processing in microsegment units.
- a switch control section 104 controls a collision signal control section 106, a data output control section 107, and a data input control section 109 for controlling data input from the ports P1 . . . , whereby data can be broadcasted.
- the bus-to-bus bridge control section 120 has a function of delivering a packet to the segment share buses 121 and an expansion ports P' . . . at the same time for broadcasting or multicasting between the microsegments.
- FIG. 12 is a block diagram to show a switching hub in a fourth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 9 are denoted by the same reference numerals in FIG. 12 and will not be discussed again.
- the switching hub in the fourth embodiment is characterized by the fact that more than one process through which data passes is provided so that processing for each microsegment is performed in parallel.
- ports P1-P4 are preceded by a plurality of input segment selection sections 122, a plurality of output segment selection sections 123, and a plurality of collision signal segment selection sections 124.
- These input segment selection sections 122, output segment selection sections 123, and collision signal segment selection sections 124 are a bus configuration and signals of ports that the sections 122-124 have are selectively connected by a selector device, etc.
- simultaneous data input/output through the ports P1 . . . belonging to different microsegments is enabled by combining a store and forward switching function in a buffer 102, the input segment selection sections 122, and the output segment selection sections 123.
- FIG. 13 is a block diagram to show a switching hub in a fifth embodiment of the invention.
- the switching hub in the fifth embodiment is provided by mixing the switching hub configuration in the fourth embodiment with the switching hub configuration in the third embodiment.
- the switching hub in the fifth embodiment is provided with more than one process through which data passes in the switching hub configuration in the third embodiment so that processing for each microsegment is performed in parallel.
- simultaneous data input/output through ports P1 . . . belonging to different microsegments is enabled by combining input segment selection sections 122 and output segment selection sections 123.
- each switching hub is provided with a segment pattern control section 125 in which a plurality of segment patterns (where which microsegments S1 . . . ports P1-P4 are members of are indicated) SP1 . . . are previously registered, and segment patterns SP1 . . . of microsegments can be selected for each switching hub by time period or in hub units.
- FIG. 14 is a schematic diagram to conceptually represent a system configuration in the sixth embodiment.
- An upper-level process PS superior to switching hubs H1 . . . is shared actually by the switching hubs H1 . . .
- each switching hub is provided with the segment pattern control section 125 in which a plurality of segment patterns SP1 . . . are previously registered, and segment patterns SP1 . . . of microsegments can be selected for each switching hub by time period or in switching hub units, combination patterns of segments (segment patterns) for a conference room, an office, a design department, etc., fitted to a layout of an installation site are provided and can be selected and set matching the application in switching hub units, and construction and management can be executed promptly and reliably.
- FIG. 15 shows a system configuration in a seventh embodiment of the invention wherein a master switching hub MH and a slave switching hub SH are interconnected by a high-speed expansion port P'.
- This expansion port P' is set as a link path and packets of microsegments registered as segment attribute common to the master switching hub MH and the slave switching hub SH are multiplexed for transmission.
- the basic configuration of the master switching hub MH is similar to that of the switching hub of the fourth embodiment and the basic configuration of the slave switching hub SH is similar to that of the switching hub of the second embodiment. Therefore, parts identical with or similar to those previously described with reference to FIGS. 9 and 12 are denoted by the same reference numerals in FIG. 15 and will not be discussed again.
- the correspondence between links of packets passing through link paths and microsegments is entered in link tables of link path management sections 26, and link path control sections 27 multiplex/demultiplex and sort microsegments based on the link path tables.
- the link indicates a microsegment path provided by various multiplexing methods and the microsegments are common to the switching hubs MH and SH, the packets passing through the link path are expanded and microsegment information is added, whereby a plurality of microsegments as link path members can be multiplexed for transmission between the switching hubs MH and SH. Therefore, common microsegments are set in port P1 . . . units between the switching hubs MH and SH, whereby the switching hubs MH and SH can be interconnected by packet multiplexing.
- Link information which is sent via a link path, is propagated from an expansion port.
- broad-band frequency modulation is executed as a multiplexing method
- each carrier frequency band becomes a link ID, corresponding to a microsegment ID.
- time-division multiplexing is executed, each time slot becomes a link ID, corresponding to a microsegment ID.
- the link path control sections 127 can also multiplex/demultiplex and sort the microsegments. If a plurality of link path expansion ports P' exist, a table by link path indicating the corresponding expansion port P' . . . is managed as a link of the link tables of the link path management sections 126.
- the switching hubs MH and SH may be interconnected by placing another switching hub therebetween as a repeater.
- the expansion port is set as a link path; particularly, to interconnect the switching hubs MH and SH via different LAN machines as repeaters, the link ID for each of link paths set as tags of type that can be used with the different LAN machines and the segment ID common to the switching hubs MH and SH are entered in the link tables of the link path management sections 126, whereby the segment ID is added to a packet passing through the expansion port P', microsegments as link path members are multiplexed among the switching hubs MH and SH for transmission, and common microsegment in port P1 . . . units can be set.
- a VLAN tag using an IEEE 802.1Q header for example, as shown in FIG. 17 can be used.
- Such a tag is used as the link ID for each link path and the segment ID common to the switching hubs MH and SH and the-corresponding link ID are entered in the link tables of the link path management sections 126.
- the link ID is added to a packet passing through the expansion port P' and microsegments as link path members are multiplexed among the switching hubs MH and SH for transmission, whereby a common microsegment in port P1 . . . units can be relayed by different LAN machines among the switching hubs MH and SH for expanding the segment range.
- the switching hubs MH and SH are interconnected by placing a single switching hub therebetween as a repeater, the link and segment IDs can also be made the same for omitting the link table.
- the slave switching hub SH is provided with a link port LP for enabling other slave switching hubs to be daisy-chained by a link path. If the link port LP is thus provided for enabling a large number of slave switching hubs SH to be daisy-chained, the number of ports of the microsegment common to the switching hubs MH, SH . . . can be increased.
- the master switching hub MH is connected to a VLAN backbone by the expansion port p' and is connected through the VLAN backbone to other LAN machines having a virtual LAN function, such as a VLAN switch.
- the LAN machines connected to the VLAN backbone support a VLAN management function and a VLAN-to-VLAN routing function, and every microsegment-to-microsegment routing is supported via the VLAN backbone.
- the master switching hub MH also comprises an expansion port P" for VLAN server connection. If a VLAN managing and supporting server is connected to the expansion port P", the master switching hub MH can also support the VLAN function.
- the master switching hub MH comprises a VLAN management section 128 having a VLAN management table and a VLAN control section 129, and VLAN-IDs common to the LAN machines of VLAN switches, etc., are set in the VLAN management table of the VLAN management section 128 together with the segment ID.
- the VLAN control section 129 multiplexes a single microsegment or microsegments as VLAN members by broad band, time division, or any other method such as sending VLAN-ID on a control line separate from packet data for transmission among the switching hubs.
- the VLAN control section 129 demultiplexes received VLAN multiplexed data and references the VLAN management table for sorting the data to microsegments, whereby a common microsegment in port P1 . . . units can be set among the switching hubs MH and SH via a VLAN switch and VLAN member devices connected to the VLAN switch and devices of microsegments formed by the master switching hub MH and the slave switching hub SH can be set as one microsegment in port P1 .
- each carrier frequency band is VLAN-ID, corresponding to a microsegment ID.
- each time slot is VLAN-ID, corresponding to a microsegment ID.
- the network management agent 112 of the master switching hub MH transfers a VLAN setting signal in conversation with a network manager (not shown), whereby the correspondence between the microsegment and VLAN group can be changed by the VLAN management section 128.
- the slave switching hub SH comprises a segment pattern control section 125 enabling previous setting/selection of a segment pattern.
- the segment pattern control section 125 is connected to the segment management section 101.
- a segment management table and a pattern name responsive to each pattern are entered in a segment pattern table of the segment pattern control section 125 and the segment management table of a specified segment pattern is copied into the segment management section 101, whereby the correspondence indicating which segment each port belongs to is set in the segment management section 101.
- FIG. 16 is a schematic diagram of the system configuration of the seventh embodiment.
- FIG. 17 shows a general LAN MAC frame format.
- the master switching hub MH is connected to backbone BB by a VLAN path and the master switching hub MH and slave switching hubs SH1-SH3 are connected by link paths. Ports P1 . . . of the slave switching hubs SH1-SH3 and VLANV1-VLANV6 of the backbone BB can become members of a common microsegment through the master switching hub MH.
- the VLAN-ID of thee VLAN switch can be made the same as the segment ID of the master switching hub MH for omitting the VLAN management table of the VLAN management section 128. Since all packets in a microsegment are broadcasted, VLAN definition of the VLAN switch needs to be set to a multicast group (broadcast group) to use such a broadcast function in the VLAN group. On the VLAN switch side, the VLAN group is defined with address and broadcast and multicast are closed in the VLAN group. To unicast a packet only to the destination address, the packet is broadcasted in the microsegment and in the VLAN group, the address of the device connected for each port of the VLAN switch is learned in an address table and switched.
- the VLAN management section 128 sets VLAN-IDs common to the VLAN switches in the VLAN table as a microsegment lookup table together with the segment IDs corresponding to the VLANs.
- the VLAN control section 129 adds VLAN-ID as tag to a single microsegment or microsegments as VLAN members, thereby transmitting VLAN multiplexed packet.
- the VLAN control section 129 collates the VLAN-ID tag of the received VLAN multiplexed data (packet) with the VLAN table for sorting the data to microsegments, whereby a common microsegment in port P1 . . . units can be set among the switching hubs via the VLAN switch and the VLAN member devices connected to the VLAN switch and microsegment devices can communicate with each other as one segment.
- the VLAN-ID corresponding to a microsegment can be set from an external network management system (not shown).
- the network management system can set the VLAN-ID in the VLAN management table of the VLAN management section 128 through the network management agent 112 of the master switching hub MH.
- the VLAN management agent 112 of the master switching hub MH sets the VLAN-ID in the VLAN management section 128 and the microsegment can be managed integratedly from the LAN machine having a VLAN function, such as a VLAN switch, or the network management system.
- the VLAN management table of the VLAN management section 128 can be omitted and a common microsegment in port units among the LAN machines having a VLAN function and the switching hubs can be expanded as a VLAN multicast group for configuring an economical system in response to the traffic concentration degree and network availability.
- VLAN management section 128 If the VLAN management section 128 enters destination and source addresses of network addresses, VLAN-IDs, and segment IDs in the VLAN management table in batch and as in VLAN multiplexing, microsegments mapped to VLANs are multiplexed for transmission with no VLAN-ID tag added to a packet, a standard LAN machine or router of another vendor such as WAN may intervene in the backbone BB.
- a standard LAN machine or router of another vendor such as WAN may intervene in the backbone BB.
- the VLAN control section 129 can sort the received VLAN multiplexed data to microsegments.
- VLAN management and segment-to-segment routing can be relegated to a backbone LAN machine of a vendor widespread like the high-end de facto standard, and access-channel LAN machines in a floor are used as the master switching hub MH and the slave switching hub SH of the port segment switching system of the invention, whereby traffic can be finely segmented to desktop terminals.
- microsegment change of ports P1 . . . can be made flexibly by remote control without replacing a crosspatch, a modular connector, etc., in a wiring closet, so that an electronic crosspatch function capable of reconfiguring microsegments economically and dynamically with good performance at high speed can be provided.
- the switch which is over layer 2 of the virtula LAN system on the back born side and connected to the expansion port detects the correspondence change of MAC address or network address with the microsegment, so that the virtual group agent executes the dynamic automatic configulation management.
- the second to seventh embodiments are settings which are located on the most physical layer side, and construct the base of the information wiring.
- FIG. 18 is a system block diagram to show an eighth embodiment, which can be adapted to the virtual LAN system according to the present invention, wherein a VLAN as a local intranet segment and a global internet segment are connected by a main router 201.
- An internet backbone and a local router switch 202 as an intranet segment member are connected to ports of the main router 201.
- Local switches 203a, 203b, 203c, 203d and 203e, and an application/database server (simply, server) 204 are connected to ports of the local router switch 202.
- Terminals 205a1 . . . , 205b1 . . . , 205c1 . . . , 205d1 . . . , and 205e1 such as desktop personal computers are connected to ports of the local switches 203a . . .
- the local switches 203a . . . have the same configuration, each comprising an intranet routing section 206a . . . having a cache for processing intranet routing and a VLAN learning/identification/forwarding section 207a . . .
- the local router switch 202 comprises an intranet route server 208 having an intranet routing table section 208a, an intranet processing section 209 for performing encapsulation, fragmentation, and reassembling in the intranet, a VLAN learning/identification/forwarding section 210, and a filtering section 211 for filtering packets between the intranet and internet.
- the main router 201 comprises an internet routing table section 212 for processing internet routing and a fire wall section 213 for protecting the intranet against an illegal invasion from the internet.
- main routers and internet protocols are designed to route packets in the global internet and not to route only a VLAN for a local intranet.
- a VLAN as a local intranet segment and a global internet segment are separated from each other and packets are filtered so that VLAN routing is processed by the local switches 203a . . . close to the terminals 205a1 . . . and the local router switch 202 and that only internet segment traffic is sent from the local router switch 202 to the main router 201, and the main router 201 processes routing to the internet or another LAN, such as a remote intranet, in the internet routing table section 212.
- each local switch 203a . . . prepares an intranet routing table in the intranet routing section 206a . . . and processes routing the VLAN as an intranet segment by the intranet routing section 206a . . . based on the prepared routing table, and only internet segment traffic is sent to the port of the local router switch 202 to which the main router 201 is connected, thereby filtering packets.
- the local router switch 202 and the local switches 203a . . . cache the routing information (routing table contents) mutually.
- the filtering is executed as follows:
- a packet is transmitted only through the local switch 203a between the terminals 205a1 and 205a2 connected to the same local switch 203a, and is not forwarded to the local router switch 202 or other local switch es 203b . . .
- Packet transmission from the terminal 205a1 connected to one local switch 203a to the terminal 205b1 connected to another local switch 203b is executed through the local switches 203a and 203b and the local router switch 202.
- the VLAN learning/identification/forwarding section 210 references the intranet routing table in the intranet routing table section 208a. If the destination address of the received packet matches an intranet address (for example, MAC address of terminal 205b1 .
- the section 210 transmits the packet to the corresponding local switch 203b and not to the main router 201.
- the local router switch 202 transmits the packet to the main router 201, which then references the internet routing table in the internet routing table section 212 for routing the packet to the internet.
- a packet transmitted from the internet to the intranet is checked for security by the fire wall section 213 of the main router 201. If no problem is found, the packet is transmitted from the main router 201 to the local router switch 202.
- the local router switch 202 references the intranet routing table in the intranet routing table section 208a for routing the packet.
- the packet data transferred between the main router 201 and the local router switch 202 is encapsulated, fragmented, and reassembled by the intranet processing section 209 of the local router switch 202, thereby enabling communication between different protocols of an internet protocol and an intranet protocol (VLAN protocol).
- traffic of the main router 201 is reduced and the processing capability of the main router 201 is limited to performance required for internet (WAN) connection, thus the load for the main router 201 is lightened as compared with management of the intranet routing table by the main router 201 as in the conventional system.
- the local switches 203a . . . and the local router switch 202 perform intranet routing processing, enabling high-speed routing.
- system costs are drastically decreased and intranet routing performance can be enhanced.
- FIG. 19 is a system block diagram to show a ninth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 18 are denoted by the same reference numerals in FIG. 19 and will not be discussed again.
- the ninth embodiment of the invention is characterized by the fact that local switches 203a . . . comprise virtual group registration/routing table sections 214a . . . in which client addresses and virtual group IDs (VLAN-IDs) of virtual groups (VLANs) are entered. That is, in the local switch 203a . . . , the client addresses and virtual group IDs (VLAN-IDs) of the virtual groups entered in the virtual group registration/routing table section 214a . . . are referenced and only when the destination virtual group ID of a transmission packet does not match the virtual group ID of the local site entered in the virtual group registration/routing table section 214a . . . , the packet is forwarded from the local switch 203a . .
- the packet is forwarded to the port of the local switch 203a . . . corresponding to the destination client address.
- the local switches 203a . . . of the ninth embodiment thus filter packets local for the main router 1 based on the client addresses and virtual group IDs (VLAN-IDs) of the virtual groups entered in the virtual group registration/routing table sections 14a . . .
- FIG. 20 shows a virtual group registration/routing table in the virtual group registration/routing table section 214a . . . , wherein the client addresses of the virtual groups (VLANs), such as MAC addresses of terminals 205a1 . . . , the port IDs of the ports of the local switches 203a . . . and the virtual group IDs (VLAN-IDs) to identify the virtual groups (VLANs) are entered.
- VLANs virtual groups
- the client addresses of the virtual groups (VLANs) such as MAC addresses of terminals 205a1 . . .
- VLAN-IDs virtual group IDs
- VLANs are defined with network addresses, for example, if a virtual group is defined for each subnet address of an internet protocol (IP), the subnet address becomes the virtual group ID (VLAN-ID) of the virtual group.
- IP internet protocol
- the virtual groups are defined at the data link layer level of the port IDs of the ports of the local switches 203a . . . or the local router switch 202, the MAC addresses of the local switches 203a . . . , and the like, the local switches 203a . . . are provided with a routing function using the virtual group IDs, whereby the MAC addresses, etc., can be handled as virtual group IDs containing the case where the destination virtual group ID of the transmission packet is the same as the destination subnet ID of the internet protocol.
- the local switches 203a . . . are provided with the virtual group registration/routing table sections 214a . . . and routing processing based on the virtual group IDs only among the virtual groups in the intranet can be performed.
- intranet routing sections 206a . . . use the virtual group registration/routing tables in the virtual group registration/routing table sections 214a . . . as intranet routing tables.
- the intranet routing section 206a . . . references the intranet routing table and routes the packet to the port of the local switch 203a . . . corresponding to the destination client address.
- the intranet routing section 206a when the destination virtual group ID differs from the source virtual group ID, the intranet routing section 206a . . . references the intranet routing table and routes the packet to the port of the local switch 203a . . .
- the intranet VLAN learning/identification section 207a . . . of one local switch 203a . . . references the virtual group registration/routing table in the virtual group registration/routing table section 214a . . . and finds a match between the destination virtual group ID and the local site virtual group ID, it determines that the packet is an intranet frame, and unicasts the packet to the port of a member of the virtual group to which the destination client address belongs. This can be realized because the number of nodes in the intranet is limited and thus the size of the virtual group registration/routing table in the local switch 203a . . . is limited.
- a filtering section of the local router switch 202 filters the local packet so as to forward the transmission packet to the main router 201.
- traffic in the main router 201 is limited to communication with external systems (internet), so that the main router 201 may comprise a small routing table and buffer and also a routing processor of a small capacity.
- the virtual group ID (VLAN-ID) does not change.
- a virtual subnet configuration wherein management of the virtual group registration/routing table (intranet routing table) does not concentrate on the main router 201 can also be realized in multilayer switching with layer 202 (data link layer) and layer 203 (network layer); multicast is efficiently processed for shortening the delay time and multiports are supported.
- Virtual groups (VLANs) independent of internet protocol subnets can be formed and VLAN routing can be processed by the local router switch 202 and the local switches 203a . . . separately from internet routing.
- virtual group IDs and subnet IDs can be set in virtual group registration/routing tables in virtual group registration/routing table sections 214a . . . of local switches 203a . . . in the same configuration as the ninth embodiment. (See FIG. 20.) Only when the destination virtual group ID of a transmission packet does not match any virtual group ID of local site VLANs registered in the virtual group registration/routing table, an intranet processing section 209 of a local router switch 202 encapsulates the destination virtual group ID in an internet protocol packet with the destination subnet ID and forwards and the resultant packet to a main router 201. If the destination client address differs from the virtual group ID of the source client address and the destination subnet ID matches the local site subnet ID, the local router switch 202 unicasts or multicasts the packet to the port corresponding to the destination client address.
- the remote site virtual group IDs in the embodiment differs from local site virtual group IDs, when terminal 205a1 . . . moves between remote and local sites, the virtual group ID of the moving terminal 205a1 . . . needs to be changed.
- the virtual groups (VLANs) are assumed to be local segmentation used in the intranet, they can be tunneled in the internet. That is, since virtual group ID (VLAN-ID) information to identify the virtual groups (VLANs) is encapsulated in a packet to be transmitted to an internet segment, the packet is not routed with the virtual group ID (VLAN-ID) in the internet segment and is routed with the virtual group ID (VLAN-ID) only in local segments.
- the number of virtual group (VLAN) segments as the intranet and the number of terminals in the segments are extremely small as compared with those in the internet and the routing calculation amount may be small accordingly.
- the virtual groups (VLANs) can be defined with port IDs, MAC addresses, network addresses as segment members, and are routed by the local switches 203a . . . as logical subnets.
- a site identification code to identify local or internet is placed in a predetermined location of a packet, whereby subnet identifier (subnet ID) of internet protocol of VLAN-ID becomes the same as local VLAN subnet and internet access subnet, and remote and local sites are integrated to a VLAN segment with the same VLAN-ID.
- subnet ID subnet identifier
- the site and VLAN-ID of the packet are encapsulated in the packet to the internet. If the site identification code differs, segmentation to another area is executed by the local router switch 202, thus a different internet protocol subnet is used. Only when the internet protocol subnet ID does not match the local subnet ID, the packet is forwarded from the local router switch 202 to the main router 201. Although it is burdensome to set subnets in the local router switch 202 and the local switches 203a . . . , the subnet of the local router switch 202 can be grouped by the site identification codes of the local switches 203a . . . , thus setting the subnets is facilitated.
- FIG. 21 is a system block diagram to show a eleventh embodiment of the invention, wherein intranet routing/bridge sections 206a' . . . are provided in place of the intranet routing sections 206a . . . of the local switches 203a . . . in the second embodiment.
- Each of the intranet routing/bridge sections 206a' . . . comprises an address learning table in which the destination client addresses and port IDs of transmission packets are learned and entered.
- client addresses, port IDs, virtual group IDs, and subnet IDs can be set in virtual group registration/routing tables in virtual group registration/routing table sections 214a . . . as shown in FIG. 20.
- Other parts are identical with or similar to those of the ninth embodiment and therefore will not be discussed again.
- the virtual group ID column of the virtual group registration/routing table becomes blank.
- the intranet routing/bridge section 206a' . . . of local switch 203a . . . collates the client address or port ID of the transmission packet with the address learning table. If the client address or port ID is not entered, the intranet routing/bridge section 206a' . . . forwards the packet to a main router 201 through a local router switch 202.
- the packet collates the virtual group ID of the transmission packet with the virtual group registration/routing table. As a result, when the virtual group ID matches the subnet ID of the local switch 203a . . . or local virtual group ID, the packet is forwarded to the destination port or local switch 203a . . .
- FIG. 22 is a system block diagram to show a twelfth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 21 are denoted by the same reference numerals in FIG. 22 and will not be discussed again.
- the twelfth embodiment of the invention is characterized by the fact that a local router switch 202 and local switches 203a . . . are provided with multicast segment sections 215, 216a, 216b, 216c, 216d, and 216e, each of which is made of a branch circuit made of a repeater, a bus, or the like for causing a physical signal of a packet to branch for each virtual group.
- multicast port addresses connected to the branch circuits (multicast segment sections 216a . . . ) as shown in FIG. 23 can be entered in a virtual group registration/routing table contained in a virtual group registration/routing table section 214a . . . of each local switch 203a . . .
- the local switch 203a . . . forwards the transmission packet to the multicast segment section 216a . . . for multicasting the transmission packet at the same time.
- the system of the fifth embodiment has the advantage of the delay time shortened as compared with normal transmitting of a transmission packet copy to the ports in order. If two or more multicast segment sections 216a . . . are provided in each local switch 203a . . . and are allocated to different segments, more than one multicast can be executed in parallel. Priority may be assigned to multicast and unicast (generally, higher priority is assigned to multicast).
- IDs indicating local virtual groups (VLAN-IDs) and IDs indicating global virtual groups (subnet IDs) as shown in FIG. 24 can be set in virtual group registration/routing tables contained in virtual group registration/routing table sections 214a . . . of local switches 203a . . . in the same configuration as the second embodiment. Transmission packets with the subnet ID indicating a global virtual group are forwarded to a main router 201 from a local router switch 202.
- local virtual group routing can be processed by the local router switch 202 and the local switches 203a . . . separately from routing to a global virtual group, and traffic of the main router 201 is reduced and the load for the main router 201 is lightened.
- Duplicate client addresses can be set as members of virtual groups and priority can be assigned to local and global virtual groups.
- FIG. 25 is a system block diagram to show a fourteenth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 19 are denoted by the same reference numerals in FIG. 25 and will not be discussed again. That is, the fourteenth embodiment of the invention is characterized by the fact that a local router switch 202 is provided with a gateway encapsulation/reassembling section 217 and that the address of the gateway encapsulation/reassembling section 217 (gateway address) is entered in virtual group registration/routing tables contained in virtual group registration/routing table sections 214a . . . of local switches 203a . . . as shown in FIG. 26.
- a local router switch 202 is provided with a gateway encapsulation/reassembling section 217 and that the address of the gateway encapsulation/reassembling section 217 (gateway address) is entered in virtual group registration/routing tables contained in virtual group registration/routing table sections 214a . . . of local switches 203a . .
- the gateway address can be entered in the virtual group registration/routing table of each local switch 203a . . . If the destination address of a transmission packet matches the gateway address, the transmission packet is sent to the gateway encapsulation/reassembling section 217 of the local router switch 202.
- the gateway encapsulation/reassembling section 217 encapsulates the transmission packet and forwards the packet to the main router 201, which then routes the packet to another local switch 203a . . . , thereby enabling taking part in a common virtual group (VLAN group) from segments of different subnets. This means that the gateway encapsulation/reassembling section 217 specially enables taking part in any desired virtual segment from different virtual segments.
- the local switches 203a . . . can form a common virtual group beyond local segments and the virtual groups can be made to take precedence over the subnets.
- FIG. 27 is a system block diagram to show a fifteenth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 22 are denoted by the same reference numerals in FIG. 27 and will not be discussed again.
- the fifteenth embodiment of the invention is characterized by the fact that an intranet route server section 208 of a local router switch 202 is provided with a routing change sensing/route calculation section 208b and that local switches 203a, 203b, 203c, 203d, and 203e are also provided with routing change sensing/route calculation sections 218a, 218b, 218c, 218d, and 218e respectively.
- the routing change sensing/route calculation sections 218a . . . detects the event and multicasts the update information of the virtual group registration/routing table to the local switches 203a . . . with high priority by using a dedicated multicast segment set in a multicast segment section 216a . . . , whereby the local switches 203a . . . perform distributed processing of local virtual group route calculation.
- the route calculation is executed by the parent local switch 203a . . . for each local virtual group, whereby local virtual group share is assigned.
- the local switch 203a . . . which becomes the parent of a predetermined local virtual group may be previously determined or the local switch 203a . . . first detecting update of the virtual group registration/routing table may become the parent for executing route calculation.
- the routing change sensing/route calculation section 208b of the intranet route server section 208 updates an intranet routing table (which is required to forward packets sent to a main router 201 form external systems to the local switches 203a . . . ) in an intranet routing table section 208a based on the update information multicasted from any local switch 203a . . . for maintaining the table.
- the main router 201 at each site updates an internet routing table in an internet routing table section 212 according to a router-to-router route calculation protocol.
- the main router 201 performs processing of access to the global virtual group or any other internet group.
- FIG. 28 is a system block diagram to show a sixteenth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 22 are denoted by the same reference numerals in FIG. 28 and will not be discussed again.
- the sixteenth embodiment of the invention is characterized by the fact that an intranet route server section 208 of a local router switch 202 is provided with a route calculation processor section 208c, a shared memory 208d, and a parallel control kernel section 208e and that each local switch 203a . . . is provided with a route calculation processor section 219a . . . , a shared memory 220a . . . , and a parallel control kernel section 221a . . .
- the shared memory 220a . . . of each local switch 203a . . . stores an intranet routing table of local virtual group contained in an intranet routing table section 208a of the local router switch 202, whereby the local switches 203a share the intranet routing table of local virtual group.
- the route calculation processor sections 219a . . . of the local switches 203a . . . perform parallel processing of route calculation stored in the intranet routing tables of local virtual group stored in the shared memories 220a . . .
- the parallel control kernel sections 221a . . . of the local switches 203a . . . exchange the intranet routing table information in the shared memories 220a . . . in synchronization with each other and manage task assignment to the route calculation processor sections 219a . . . for performing parallel processing of route calculation for maintaining the optimum intranet routing tables.
- the sections 221a . . . also manage the resources of the route calculation processor sections 219a . . . and the shared memories 220a . . . of the local switches 203a . . . , the intranet routing tables, etc., and control the tasks for integrating the route calculation processor sections 219a into one route calculation processor.
- the main router 201 performs processing of access to a global virtual group or any other internet group.
- the local router switch 202 maintains the intranet routing table required to forward packets sent from external systems to the local switches 203a . . .
- FIG. 29 is a system block diagram to show a seventeenth embodiment of the invention. Parts identical with or similar to those previously described with reference to FIG. 22 are denoted by the same reference numerals in FIG. 29 and will not be discussed again.
- the seventeenth embodiment of the invention is characterized by the fact that a local router switch 202 and local switches 203a, 203b, 203c, 203d, and 203e are provided with proxy route calculation/protocol control sections 222 and 223a, 223b, 223c, 223d, and 223e respectively.
- the proxy route calculation/protocol control section 222 of the local router switch 202 comprises an address conversion table section 222a, a packet edit buffer 222b, and a routing table sharing section 222c for controlling resource management concerning a specific subnet of address space handled by the local switches 203a . . . , address conversion concerning protocols, packet editing, and protocol conversion and sharing a routing table with a main router (or a route server) for standing proxy for route calculation.
- the proxy route calculation/protocol control section 223a . . . of each local switch 203a . . . controls resource management of address space concerning a communication protocol with terminals 205a1 . . . connected to the local switch 203a . . . and packet editing and stands proxy for route calculation like the proxy route calculation/protocol control section 222 of the local router switch 202.
- the proxy route calculation/protocol control sections 223a . . . of the local switches 203a . . . share route calculation concerning a local virtual group subnet.
- the main router 201 performs processing of access to a global virtual group or any other internet group, and maintains the routing table required to forward packets sent from external systems to the local switches 203a . . .
- the main router 201, the local router switch 202, and the local switches 203a . . . execute route calculation concerning the intranet in a distributed manner and in cooperation with each other, thereby lightening the route calculation load for the main router 201.
- communication protocols with the terminals 205a1 . . . managed in the local switches 203a . . . can be used to provide an integrated network for connecting global remote sites via the internet.
- FIG. 30 is a system block diagram to show an eighteenth embodiment of the invention.
- FIG. 31 is a block diagram to show a local packet switch 203a.
- Other local packet switches 203b . . . also have the configuration shown in FIG. 31. For simplicity, only the local packet switch 3a is illustrated.
- the eighteenth embodiment of the invention uses ATM (asynchronous transfer mode) for an interface of a backbone for connecting the local router switch 202 and the local switches 203a . . . in the eighth to seventeenth embodiments and uses the local switches 203a . . . as packet switches (so-called LAN switches).
- ATM asynchronous transfer mode
- LAN switches packet switches
- the ATM backbone is connected to an ATM interface section 226 contained in the local packet switch 203a.
- the ATM interface section 226 has a backbone buffer memory 226a for temporarily storing an ATM cell.
- An intranet routing/bridge protocol processing section 224a connected to the ATM interface section 226 comprises an ATM LAN emulation client (LEC) section 227a, an IP connection section 228a, and a route calculation section 229a.
- the IP connection section 228a uses Classical IP and APR over ATM defined in RFC1577 as IP over ATM.
- the route calculation section 229a updates an intranet routing table (virtual group routing table) for locally preparing the intranet routing table based on the VLAN-ID (virtual group ID) entered in virtual group registration/routing table in virtual group registration/routing table section 214a shown in FIG. 20.
- the intranet routing/bridge protocol processing section 224a of the local packet switch 203a routes an intranet packet received via a packet buffer 232 from an input port 2301 . . . according to the virtual group routing table. Therefore, as in the first embodiment, intranet VLAN routing is executed not via a main router 201.
- the packet is forwarded as an internet packet to the port of the local router ATM switch 202 to which the main router 201 is connected.
- packets are filtered so that only internet segment traffic is sent to the main router 201.
- the local packet switch 3a forwards only packets requiring routing in the main router 201 to the main router when the internet or remote site VLAN is accessed.
- the main router 201 needs to have a small packet processing capability and moreover the local packet switches 203a . . . support VLAN routing for the intranet, providing a high-performance network at low costs.
- routing is executed according to the standard global internet protocol (IP); in the intranet, VLAN segments are identified according to locally defined VLAN-ID and routing is executed. In layer 203 VLAN, segmentation to virtual subnets is executed. In layer 202 VLAN, segmentation to virtual segments (normally, broadcast domains) is executed. Therefore, if the internet protocol subnets are in a one-to-one correspondence with the intranet virtual subnets or virtual segments, VLAN-IDs are converted into internet protocol subnets on the internet.
- IP global internet protocol
- VLAN-IDs may be set independently of internet protocol subnets, a plurality of virtual subnets or virtual segments may be set in a router internet subnet, or a VLAN virtual subnet or virtual segment may be set across router internet subnets.
- the LAN switches (local router switch 202 and local switches 203a . . . which need to execute routing based on VLAN-ID, comprise an intranet routing table apart from an internet routing table.
- IPv6 a local address and a provider address are separated at the header.
- a fire wall section 213 of the main router 201 has a function of changing an internet IP address and an intranet IP address to different addresses.
- the addresses may be encapsulated by an intranet processing section 209 of the local router switch 202 and furthermore the resultant capsule may be encrypted for transmission.
- a virtual group control section 233a sets virtual group priorities in response to the protocol difference, subnet, and VLAN-ID (LLC/SNAP).
- the main router 201 processes routing connected to the internet or LAN according to the internet routing table.
- the local packet switches 203a cache routing information mutually in the intranet routing/bridge protocol processing sections 224a, thereby lightening the routing load for the main router 201, whereby the processing capability of the main router 201 is limited to performance required for internet (WAN) connection, and the local packet switches 203a . . . enable high-speed routing for the intranet.
- WAN internet
- a virtual group distributed management section 234a manages a virtual group registration table 235a, a virtual group routing table 236a, and a client definition table 237a.
- a virtual group identification section 242 and an intranet VLAN learning/identification section 207a reference the tables 235a-237a and the virtual group control section 233a controls a forwarding section 239a for forwarding unicast and multicast to output ports 2401-2406.
- the main router 201, the local router ATM switch 202, and the local packet switches 203a . . . share the functions described in the ninth to seventeenth embodiments.
- a multicast segment switch 241a contained in the local packet switch 203a is equivalent to the multicast segment section 216a described in the twelfth embodiment. If a transmission packet is destined for multicast, it is forwarded to the output port 2401 . . . indicated by the multicast port address entered in the virtual group registration table 235a and the virtual group routing table 236a.
- the multicasted packet is not a transmission packet copy and is made to branch as a physical signal by the multicast segment switch 241a. Thus, the delay time can be shortened as compared with the case where the transmission packet is copied and multicasted to the output ports 2401 . . . in sequence.
- VLAN-IDs of local virtual groups (local VLANs) and subnet IDs of global virtual groups (global VLANs) as shown in FIG. 24 can be set in the virtual group registration/routing tables of the local packet switches 203a . . .
- the virtual group identification section 242 identifies a packet to which VLAN-ID is added by a buffer management section 231 or a packet to which VLAN-ID is already added according to the client address of the packet, and if the packet is to be transmitted to a global virtual group, it is forwarded to the main router 201.
- the client address can be set multiply as members of virtual groups.
- a priority assignment column to local and global virtual groups can be added to the virtual group registration/routing table.
- a virtual group priority message from the virtual group registration/routing table is sent to the virtual group control section 233a and priority control in the forwarding section 239a is performed.
- the route calculation sections 229a . . . contained in the intranet routing/bridge protocol processing sections 224a . . . of the local packet switches 203a . . . share the route calculation function and perform parallel processing of route calculation stored in the intranet routing table of local virtual group.
- a parallel processing kernel section (not shown) of each local packet switch 203a . . . is installed as an operating system of a CPU (not shown) of the local packet switch 203a . . . as a route calculation processor forming the route calculation section 229a . . .
- the parallel processing kernel sections exchange intranet routing table information stored in a shared memory in synchronization with each other, manage task assignment to the route calculation section 229a . . . , and perform parallel processing of routing calculation for maintaining the optimum routing table.
- the virtual group distributed management sections 234a . . . installed in the parallel processing kernel sections manage the resources of the route calculation sections 229a . . . and the shared memories of the local packet switches 203a . . . the intranet routing tables, etc., and control the tasks for integrating the route calculation sections 229a . . . of the local packet switches 203a . . . into one route calculation section.
- the main router 201 performs processing of access to a global virtual group or any other internet group and maintains the routing table required to forward packets sent from external systems to the local packet switches 203a . . .
- FIG. 32 is a system block diagram to show a nineteenth embodiment of the invention.
- FIG. 33 is a block diagram to show a local packet switch 203a . Parts identical with or similar to those previously described with reference to FIGS. 30 and 31 are denoted by the same reference numerals in FIGS. 32 and 33 and will not be discussed again.
- the local switch 203a is a cell switch (so-called ATM switch, hereinafter called local ATM switch) and comprises an ATM interface section 226 to which an ATM backbone is connected as in the eighteenth embodiment.
- an intranet routing/bridge protocol processing section 224a . . . contained in the local ATM switch 203a comprises internet protocol processing facilities in the ATM, such as an ATM LAN emulation client (LEC) section 227a and an MPOA section 247a.
- LEC ATM LAN emulation client
- the ATM interface section 226 once converts ATM cells into a packet for identifying and filtering packets according to virtual groups. Therefore, processing at the packet level is similar to that in the eighteenth embodiment, and facilities similar to the local switches 203a . . . of the eighth to seventeenth embodiments can be installed.
- the cell conversion section 243a of the local ATM switch 203a in the twelfth embodiment may be changed to the packet conversion section 246a, the cell buffer 244a to a packet buffer, the packet conversion section 246a of the forwarding section 239a to the cell conversion section 243a, the cell bus type switch 245a to a packet bus type switch, and the local ATM switch 203a to a packet switch rather than the cell switch.
- processing at the packet level is similar to that in the eighteenth embodiment, and facilities similar to the local switches 203a . . . of the eighth to seventeenth embodiments can be installed.
- normally cells are relayed intact in the ATM switch and virtual group identification and tagging are entered in the packet switch and cell switch edge portion, thus the configuration of the eighteenth embodiment is general.
- the local ATM switches 203a . . . each comprising the ATM interface section 226 are connected to each other and route intranet packets directly to adjacent local ATM switches according to an intranet routing table for providing redundancy for the backbone.
- a plurality of protocols may be provided in each end system and classified into those covering internet access segments and those covering VLAN segments.
- a plurality of MAC addresses and network addresses may be provided for the internet protocol of each end system and classified into addresses corresponding to internet access segments and addresses corresponding to VLAN segments.
- the eighth to nineteenth embodiments of the present invention relate to the technique to combine the internet in conformity with the standard with the unique intranet and use together with.
- FIG. 34 shows a system configuration of a twentieth embodiment of the invention, which can be adopted to the virtual LAN system according to the present invention.
- virtual group agents VA . . . can set client addresses of virtual groups and a user environment for each virtual group in a virtual group registration/routing table VT wherein segment configurations of different virtual groups in network management, network service, groupware, etc., are set, and customize network management and network service dynamically in coordination with users H1 . . . through clients U1 . . . in response to user demands for providing a virtual network environment as a user environment meeting the user demands such as unicast and multicast traffic band allocation in virtual group units.
- the virtual group registration/routing table VT can take a format in which it is divided into parts for each group if the table is not of small scale.
- the table VT includes a client definition table 318, a user environment setting table 330, and an linkage table with a different system 331.
- the virtual group originally is set for each work group for users to collaborate with each other for a specific purpose.
- the client address of the virtual group and a user environment with virtual group setting for each group can be set in the client definition table 318 and the user environment setting table 330 of the virtual group registration/routing table VT from the viewpoint of the user H1 . . .
- the virtual group agent VA automatically customizes network management and network service dynamically in coordination with user H1 . . . in response to change in user H1 . . . demands for providing a virtual network environment as a user environment meeting the user H1 . . . demands such as unicast and multicast traffic band allocation in virtual group units.
- the services to be customized include facilities use service concerning utilities UT, computing service concerning groupware, amenity service concerning a residential or amenity environment of the user H1 . . . , networking service concerning the virtual group, and administration service concerning network management, for example.
- the virtual group does not change a packet, and the virtual group agent VA in switch S supports. There is no problem via WAN.
- VGSA . . . denotes a virtual group server
- M denotes a virtual network management server
- M' denotes a virtual network management server in a different system
- UT denotes security utilities such as lighting L1, air conditioning L2, and locking L3.
- FIG. 35 shows the configuration of the switch S.
- a user environment is set in a client definition table 318 shown in FIG. 36.
- the client definition table 318 is connected to a virtual group registration table 301 in a virtual group agent VA built in the switch S in FIG. 35, and is pointed to by a pointer in the virtual group registration table 301 shown in FIG. 38.
- a switch communication protocol communication section 302 sends a user environment message to a virtual group distributed management section 303.
- a packet from an input port 341 . . . is stored in an area of a packet buffer 306 specified by a buffer management section 305 of a buffer section 307 and at the same time, the buffer management section 305 generates a pack pointer pointing to the storage location of the packet.
- a virtual group identification section 309 collates a pair of the client addresses of the packet destination and source with the virtual group registration table 301 and identifies the corresponding virtual group
- the packet pointer is stored in a virtual group queuing section 308 of a buffer pointer queuing table 315 for queuing the virtual group only with the pointer without moving the data in the packet buffer 306 of a shared memory. If the packet is a broadcast packet, its packet pointer is stored in a broadcast queuing section 310.
- the pointer pointing to the storage address of the packet in the packet buffer 306 is queued on an unknown group queuing section 311.
- a virtual group control section 314 When a virtual group control section 314 detects the port state of output ports 3121 . . . and finds an output port 3121 . . . idle, it instructs a forwarding section 313 to send the packet.
- the forwarding section 313 reads the pointer of the specified packet from the buffer pointer queuing table 315 and sends the packet data in the packet buffer 306 pointed to by the pointer through the idle output port 3121 . . .
- the virtual group control section 314 uses a timer in the virtual group control section 314 and forwards the packets in the virtual group queuing order at short time intervals according to the virtual group priorities.
- virtual groups for executing communication of video information, etc. with much traffic are given high priority; virtual groups for online system transaction, feedback control, etc., even with low traffic for which reliable message transmission within the permissible time is required can also be given high priority.
- the timing interval of processing of packets of virtual groups with low priority in batch processing, file transfer, etc., is the longest; the transmission buffer is scanned in a shorter period for virtual groups with higher priority and the packet of the virtual group with the highest priority is handled first.
- the packet assigned high priority is forwarded within the permissible time set in the priority processing timer by the virtual group distributed management section 303 after the data is input.
- Virtual custom group described in the first embodiment are formed according to client addresses and virtual groups different in definition method of protocol layer, etc., can be operated solely or be mixed.
- the virtual custom groups most match organizations such as enterprises as main client addresses of segmentation of a virtual network of the invention.
- the virtual network groups also become virtual network objects.
- the virtual groups are identified in the order of virtual custom group, virtual network group, and virtual LAN group as the custom LAN switch. Operation as the third-layer switch in the virtual network group order or as the second-layer switch for identifying virtual groups only with MAC addresses is performed according to the installation state or selection.
- the network address and the user-defined address are blank in the second-layer switch
- the user-defined address is blank in the third-layer switch
- all of the MAC address, network address, and user-defined address are specified in the custom switch.
- a virtual group learning section 316 in the virtual group agent VA shown in FIG. 35 receives a port change message from the virtual group identification section 309 and outputs a topology change message.
- the virtual group learning section 316 performs different operation depending on whether or not the home switch of the terminal is changed. If no home switch change is made, the virtual group learning section 316 updates the home switch port in the virtual group registration table 301, thereby executing dynamic automatic configuration management.
- the virtual group distributed management section 303 of a new home switch to which the terminal is moved exchanges a virtual group management message for updating the home switch name and the home switch port in each of the virtual group registration tables 301 of other switches.
- the switch S contains the virtual group routing table 308 for each virtual group and the buffer pointer queuing table 315. Since another switch is cascaded to a port of one switch in the distributed switch configuration, a plurality of virtual groups and a plurality of terminals are assigned for each port and the switch to which each terminal is directly connected is the home switch of the terminal and the terminal is connected to a port of the home switch.
- the home switch name in the virtual group routing table 308 of the switch is the switch name of the terminal. If the terminal is not directly connected to one switch S1 . . . , the home switch name differs and the routing connection port in the virtual group routing table 308 is the port name corresponding to the optimum route leading to the home switch to which the terminal is connected.
- the virtual group distributed management section 303 of a new home switch to which the terminal is moved exchanges a virtual group management message for updating the home switch name and the home switch port in each of the virtual group registration tables 301 of other switches.
- the virtual group distributed management section 303 of a switch adjacent to the home switch updates the routing connection port and client distance in the virtual group routing table 308 and sends a virtual group management message to another adjacent switch S1 . . . for providing update information of the virtual group registration table 301 and the virtual group routing table 308 accompanying the topology change.
- the switch When receiving the virtual group management message, the switch updates the virtual group registration table 301 and the virtual group routing table 308 of the switch according to the update information of the virtual group registration table 301 and the virtual group routing table 308 accompanying the topology change, and sends the virtual group management message to other switches in sequence for updating the virtual group registration table 308 and the virtual group routing table 308, thereby learning for the terminal move and dynamically updating the virtual group routing table 308.
- the client definition table 318 shown in FIG. 36 is also updated and the setup user environment is also inherited for a physical move of the network and is automatically updated by learning.
- the virtual group distributed management section 303 exchanges a management message with other switches and receives a user environment message according to a user request as virtual group agent VA for exchanging switch management information such as the MAC addresses and virtual groups of the switches, thereby entering the connection port leading to the optimum routing path with a minimum number of switch repetition stages for each switch in the routing connection port of the virtual group routing table 308 of each switch and setting the priority processing timer of scheduling responsive to the number of switch S repetition stages to provide the delay time for priority processing.
- Each switch S can see which switch connected to which port by virtual group identification and virtual group learning. Further, the virtual group distributed management section 303 exchanges change information of the virtual group routing table 308 with other switches S. If a user environment message according to a user request and switch S topology change information are entered, a virtual group management message is transferred in sequence between the adjacent switches S, thereby learning for the terminal move and updating the virtual group routing table 308 dynamically.
- the virtual group control section 314 selects an optimum routing path between ports in each virtual group and forwards a packet by setting the priority processing timer. Resultantly, the delay time of a packet with high priority is provided.
- the virtual group distributed management section 303 updates the routing connection port and the client distance in the virtual group routing table 308 by transferring a virtual management message in sequence between the adjacent switches.
- forwarding processing to ports is performed in sequence based on the virtual group routing table 308 set by the virtual group distributed management section 303.
- the packet is forwarded to the previously learned port.
- a broadcast packet and a packet with a destination address not contained in the table are output from a switch domain, thus are multicasted to all ports.
- the agent of the home switch of the terminal updates the virtual group registration table 301 and the virtual group routing table 308.
- the optimum connection port address indicating which port of switches S distributed over the network the virtual group VA is connected to is entered in the virtual group routing table 308 of each switch S distributed over the network. This means that the routing table is formed for each virtual group.
- the virtual group registration table 301 for virtual group identification and virtual group learning and the virtual group routing table 308 for forwarding from output ports are divided for the switch S shown in FIG. 35.
- the client addresses of the destination and the source of a packet are collated with the virtual group registration table 301 and the virtual group containing both the client addresses of the packet destination and source is identified.
- the virtual group registration table 301 and the virtual group routing table 308 can be defined as the same structure and can also be brought together on installation.
- the optimum connection port address is entered in the virtual group routing table 308 in FIG. 38 as the routing connection port. That is, in the distributed switch configuration, another switch is cascaded to a port of one switch, thus for the port to which a switch is connected, the connection port becomes a port name corresponding to the optimum route leading to the home switch S1 . . . to which the terminal is connected.
- the virtual group learning section 316 sends a topology change message to the virtual group distributed management section 303, which then learns in response to a user environment message according to a user request and the topology change and dynamically updates the virtual group routing table 308.
- the virtual group identification section 9 collates a pair of client addresses (1) and (2) of the packet destination and source with the virtual group registration table 301 and identifies the virtual group containing both the client addresses of the packet destination and source.
- the virtual group learning section 316 dynamically executes automatic configuration management for a terminal move. That is, when ports differ although a client address match is found as a result of the virtual group identification for a terminal move, the virtual group learning section 316 outputs a port change message for dynamically updating the virtual group registration table 301, thereby executing automatic configuration management automatically.
- Client addresses and the priority for each virtual group can be set in the virtual group registration table 301 and the virtual group routing table 308 of each group in the switch S As shown in FIG. 38.
- the virtual group control section 314 allocates a band of each traffic type of unicast, multicast, and broadcast in group units in response to the virtual group priority.
- the forwarding section 313 transfers a packet to a specified port by scheduling control of the virtual group control section 314.
- the virtual group identification section 309 of each switch S has the virtual group learning section 316 for collating input port 341 . . . and the packet source address with the virtual group registration table 301, detecting topology change such as a terminal move, and automatically updating the virtual group registration table 301 and the virtual group routing table 311.
- the virtual group distributed management sections 303 of the switches S as virtual group agents VA dynamically manage the virtual group registration tables 301 and the virtual group routing tables 308 distributed to the switches S in coordination with each other based on topology change detection of a terminal move, a switch S move, etc., whereby virtual groups can be shared among the switches S in the network.
- Virtual group agents VA distributed to the switches can also be installed in virtual group servers VGS each acting as a representative in virtual group units or for a virtual group cluster.
- the virtual group servers VGS can manage the state of the virtual group agent VA and mediate communication between the agents VA and also dynamically manage the virtual group registration tables 301 and the virtual group routing tables 308 in coordination with each other as a switch S agent function.
- the virtual group registration tables 301, the client definition tables 318, and the virtual group routing tables 308 updated and managed in the virtual group servers VGS are cached in the distributed switches S and the virtual group sever VGS distributes change information in the tables to the switches S.
- a virtual group is formed for each terminal according to client addresses entered in a packet without adding an extra header or tag to the packet of a frame format in conformity with a standard as shown in FIG. 2 and independently of switch S ports.
- the client address represents a feature set of a MAC address determined by a medium access method of LAN, a network address determined by a network operating system or communication protocol, an application address defined by application software or user H1 . . .
- General LAN application is a client-server model wherein a plurality of clients share a database in the server; multiple access to the database is made in online transaction processing of account-system jobs.
- the delay time introduces a problem because of synchronization.
- High-speed communication and small delay time are required for data extraction (data query) to grasp, analyze, and simulate information and support decision making and for dataware houses which want to know the result as early as possible interactively.
- data query data query
- a larger amount of data needs to be sent in small delay time; high priority is applied and the data amount increases.
- a virtual corporation via WAN requires server-to-server communication at remote sites and electronic commerce needs to interactively communicate with a large number of terminals at remote sites. Monitor control messages for maintaining and managing the network must be handled at the highest priority.
- a plurality of switches are placed in a distributed manner like S1 . . . as local switches and terminals A1 . . . , B1 . . . , and C1 . . . connected to the switches S1 . . . belong to different virtual groups VG1 . . .
- second layer level can be defined for each MAC address of a network interface card (NIC) of each terminal, but a plurality of virtual network groups (third layer level) different in protocol can be defined and a plurality of virtual custom groups can be defined at the application level.
- FIG. 37 shows communication with the terminals A1 . . . , B1 . . . , C1 as one virtual group VG for simplicity.
- virtual LAN groups (second layer level) are represented as switched domains and communication between the switched domains and broadcast wall are represented as routing service between switched domains, and placement of network service server and network management server NMA among the switched domains are shown.
- the virtual group agent VA of the switch S shown in FIG. 35 is placed in the distributed switches S1 . . . and the virtual group agents VA . . . support the virtual group dynamically in coordination with each other.
- virtual group registration tables 301 and virtual group routing tables 308 provide dynamic virtual group configuration for the optimum routing and a terminal move as shared table, as shown in FIG. 38.
- the virtual group learning section 316, the virtual group registration table 301, the virtual group routing table 308, the virtual group distributed management section 303, and the virtual group control section 314 become important components, as shown in FIG. 35.
- a port change message extraction function in the virtual group identification section 309 also becomes an important function.
- the virtual group identification section 309 codes client addresses (1) and (2) together by a hash function and collates the hash function with the virtual group registration table 301 coded by hash functions, so that an increase in the delay time does not introduce a problem as compared with the format of adding a header or tag to a packet.
- the virtual group identification section 309 of collates a pair of MAC addresses (1) and (2) of the packet destination and source with the virtual group registration table and identifies a virtual group containing both the MAC addresses.
- the virtual group identification section 309 of collates a pair of MAC addresses (1) and (2) of the packet destination and source with the virtual group registration table and identifies a virtual group containing both the MAC addresses.
- an extra header or tag is not added to a packet and virtual network groups VG1 . . . of terminals A1 . . . , B1 . . . , C1 . . . in conformity with the conventional standard are supported.
- the virtual group identification section 309 collates a pair of network addresses (1) and (2) of the packet destination and source with the virtual group registration table 301 and identifies a virtual group VG containing both the network addresses.
- the virtual group identification section 309 collates a pair of application addresses (1) and (2) of the packet destination and source with the virtual group registration table 301 and identifies a virtual group VG containing both the application addresses.
- the client name is entered in the virtual group registration table 301 in FIG. 38 and the virtual group routing table.
- Different client names can be entered for each virtual LAN group, each virtual network group, and each virtual custom group. If a virtual LAN group, virtual network group, and virtual custom group are defined for one MAC, virtual LAN group definition rows, virtual network group definition rows, and virtual custom group definition rows are contained in the virtual group registration table 301 and the virtual group routing table 308. Further, client definition table pointer is contained.
- the virtual group identification section 309 collates addresses with the virtual group registration table 302 in the order of the virtual custom group definition rows, the virtual network definition rows, and the virtual LAN group definition rows.
- the machine type is also entered in the client name so that the client name is also the identification code of the machine type such as switch or terminal.
- the virtual group distributed management section enters the MAC address directly connected to a port of the switch or indirect connection in a switch connection map. Connection map information of the entire network is provided by using the virtual group registration table and the switch connection map in combination. Since connection of adjacent ports is seen, topology is drawn on a connection relation chart, which is called a map. If topology is a tree structure, route search is easy to make. If topology is meshes, distances of routes as transmission time need to be compared. If switches having the same transmission speed are connected at multiple stages, the number of stages is assumed to be the distance. For example, how many paths from terminal A1 to terminal A9 exist is reflected in the numeral in the client U distance of each terminal in each virtual group routing table 308.
- the configuration of the forwarding section 313 depends on the switch configuration method. Most of known systems adopt a shared high-speed parallel bus; the band width of the bus is set to about twice the sum total of port transmission bands and the configuration is often used for a chassis-type back plane. In a parallel configuration with a crosspoint switch, input buffer type, output buffer type, and the like are available. Since the packet buffer 306 is a shared memory, the entire configuration in FIG. 35 is buffer sharing type (store and forward switching type), but the above-mentioned switching methods can be used in combination for the forwarding section 313.
- Check sum in the frame format in FIG. 2 is not executed, whereby the LAN switch S can be operated as cut-through type.
- the operation mode of the switch namely, the store and forward switching type for executing check sum or the cut-through type for executing no check sum can be defined in the group type in the virtual group registration table.
- the cut-through type enhances the throughput of the switch, but cannot filter a defective packet.
- the priority set in the virtual group registration table takes precedence over the operation mode of the switch. Since the switches are connected at multiple stages, the packet transmission delay time varies depending on how ports are idle in each switch and the queuing wait time. Thus, it is necessary to insure the transmission time in coordination as a system.
- a virtual group management message is exchanged between the virtual group distributed management sections 303.
- network management protocols such as SNMP (RFC1157: Simple network management protocol) for managing each device on a subnetwork based on MIB (management information base) and RMON (RFC1271: Remote monitoring) for managing the entire subnetwork are exchanged between a network management protocol agent 319 and an external network manager for supporting the industry standard such as collection of statistical information.
- virtual group information is added to packets or packets are classified according to information of subnet addresses, etc., of a third-layer protocol of OSI protocol layer model, and the switch references the information. It is intricate to change subnet setting, etc., in router segmentation; network management and maintaining costs introduce a problem that cannot be bypassed in a system involving change of close to 30 percent of terminals for a year.
- Virtual LAN groups of the invention for registering virtual groups only with MAC addresses are intended for priority processing, learning load distribution, and raising of routing efficiency.
- priority processing for example, priorities are assigned in the order of a management group, a time critical group insuring the delay time, a switch control group for updating registration tables dynamically, high-speed terminals, and low-speed terminals requiring no priority processing from high to low.
- SNMP or RMON network management is set in the management group.
- the network management service server can also manage the virtual group registration tables 301 and the virtual group routing tables 308, in which case the server collates a lookup table cached in the switch S1 . . . with a client address.
- broadcast from a server . . . can also be transmitted to the entire virtual group in server-to-server connection.
- Virtual service of segment A can be received at only the terminals belonging to the virtual group VG1. Broadcast delivered from client U is limited to the virtual group VG to which the client U belongs and the network service server follows unknown group broadcast from the client U in coordination with the virtual group server VGS. For the unknown group broadcast, the virtual group server VGS sees the protocol type of packet and delivers the broadcast to a specific network service server or virtual group server VGS. The network service server sets a new virtual group.
- connection ports of virtual groups VG1 . . . are distributed to switches S1 . . . and S10 . . . distributed over a network and virtual group registration/routing table VT and virtual group agent are placed in the switches S1 . . . and S10 . . . in a distributed manner.
- the virtual group agent VA segments various utilities UT such as BA utilities UT of security, etc., such as air conditioning L2, lighting L1, and locking L3 into virtual groups VG and dynamically manages the virtual group registration/routing table VT distributed to the switches S1 . . . , whereby the virtual group agents VA execute network service of customizing the utilities UT and automatic configuration for user H1 . . . in coordination with each other in response to a request for setting virtual network management server M related to resource use of a different system from the user H1 . . .
- the virtual group agent VA is made up of two types of agents different in role/character, namely, virtual network agent VNA and virtual user agent VUA
- these agents VNA and VUA execute network service of customizing the utilities UTA . . . and automatic configuration for the user H1 . . . in coordination with each other in a configuration wherein the virtual group registration/routing table VT for supporting a user environment and the virtual network agent VNA are placed in the switches S1 . . . in a distributed manner and a user environment table 30 and the virtual user agent VUA are placed in the switches S1 . . . or terminals A1 . . . , B1 . . . , C1 . . . in a distributed manner.
- the virtual user agent VUA accepts a utility customization request made by the user H1 . . . through conversation with the user H1 . . . and manages the user environment table 330 and the virtual network agent VNA manages the virtual group registration/routing table VT for segmenting various utilities UT . . . into virtual groups and executing network service of automatic configuration for supporting the user environment.
- connection ports of virtual groups VG1 . . . are distributed to switches S1 . . . distributed over a network, and virtual group registration/routing table VT and virtual group agent VA are placed in the switches S1 . . . . . in a distributed manner.
- a different system linkage table 331 of a user environment setting area for each group in the virtual group registration/routing table VT is formed and linkage conditions of utilities UT of building automation BA and utilities UT of a different system can be set.
- linkage conditions of utilities UT of building automation BA and utilities UT of a different system can be set.
- the virtual group agents VA coordinate with each other and segment the resources of a different system into virtual groups in coordination with a different system management server and dynamically manage the virtual group registration/routing table VT distributed to the switches S1 thereby customizing the linkage conditions of the building automation utilities and different system utilities for automatic configuration.
- the different system linkage table 31 of a user environment setting area for each group in the virtual group registration/routing table VT is formed and the linkage conditions of the building automation utilities and different system utilities can be set and are customized for automatic configuration.
- connection ports of virtual groups VG1 . . . are distributed to switches S1 . . . distributed over a network, and virtual group registration/routing table VT and virtual group agent VA are placed in the switches S1 . . . . . in a distributed manner.
- the client addresses of the virtual groups VG1 . . . and a user environment can be set in the virtual group registration/routing table VT.
- the virtual group agents VA distributed to the switches S1 . . .
- the virtual group agent VA is made up of the three types of agents different in role or character: virtual user agent VUA, virtual network agent VNA, and virtual network service agent N, as shown in FIG. 40.
- the agents customize the virtual network environment to the user environment for automatic configuration in coordination with each other as in a conceptual diagram shown in FIG. 42.
- the virtual group agents VA (virtual user agent VUA, virtual network agent VNA, and virtual network service agent N as shown in FIG. 40) distributed to the switches S1 . . . customize the virtual network environment to the user environment in coordination with each other in automatic response to user's network resource use requests, terminal move, addition, change, etc., in accordance with the constraints and rules of conflict detection/negotiation/plan correction/learning preset for the network environment for the agents.
- the network configuration, function, and service are customized so as to fit the end user by the agent function.
- the individual agents do not know all information concerning the network and get necessary information by negotiation.
- connection ports of virtual groups VG1 . . . are distributed to switches S1 . . . distributed over a network and as shown in FIG. 43, a virtual group agent VA is made up of three types of agents different in role/character, namely, virtual network agent VNA, virtual user agent VUA, and virtual network service agent N, a virtual group registration/routing table VT and the virtual network agent VNA are placed in the switches S1 . . . in a distributed manner, and a user environment table 330 and the virtual user agent VUA are placed in the switches S1 . . . or terminals A1 . . . , B1 . . . , C1 . . . in a distributed manner.
- numeral 333 denotes a virtual network service table.
- the virtual network service agent N is placed in any desired location in the network as shown in FIG. 41 (virtual network server VNS in FIG. 41). It manages a virtual network service table 333 of a structure shown in FIG. 44 and segments resources of a different system into virtual groups VG1 . . . in coordination with a different system management server M'.
- the virtual network service agent N dynamically manages the virtual group registration/routing table VT distributed to the switches in coordination with the virtual network agent VNA, whereby the virtual user agent VUA and the virtual network agents VNA distributed to the switches customize the utilities UT of the different system to the user environment and execute automatic configuration of a network environment in coordination with each other in response to a request for setting virtual network related to resource use of the different system from the user H1.
- the agents VNA, VUA, and N customize the utilities UT of a different system to a user environment and execute automatic configuration of a network environment in coordination with each other in a configuration wherein the virtual group registration/routing table VT for supporting the user environment and the virtual network agent VNA are placed in the local switch S1 . . . in a distributed manner, the user environment table 330 and the virtual user agent VUA are placed in the local switch S1 . . . or terminal A1 . . . , B1 . . . , C1 . . . in a distributed manner, and the virtual network service agent N is placed in any desired location in the network.
- the virtual network agent VNA, the virtual user agent VUA, and the virtual network service agent N have roles/characters and functions as shown in FIG. 40. That is, the virtual user agent VUA accepts a utility customization request made by the user H through conversation with the user H and manages the user environment table 30, the virtual network agent VNA dynamically manages the virtual group registration/routing table VT, and the virtual network service agent N segments the resources of a different system into virtual groups.
- connection ports of virtual groups VG1 . . . are distributed to switches S1 . . . distributed over a network
- virtual group registration/routing table VT and virtual network agent VNA are placed in the switches S1 . . . . . in a distributed manner
- a user environment table 330 and a virtual user agent VUA are placed in the switches S1 . . . or terminal A1 . . . , B1 . . . , C1 . . . in a distributed manner
- a virtual network service agent N is built in a local network manager NM of a distributed management system.
- a general distributed management system is made up of a network management manager NKM for executing centralized management of the entire network and local network managers NM for executing distributed management; in local portions, the network management manager NKM in FIG. 40 is replaced with the local network manager NM.
- the network manager NM in the local switch S1 . . . is contained in a virtual network management system K2 in FIG. 40.
- virtual network management server M and virtual network service agent N of the virtual network management system K2 are integrated into one at the local level of distributed management.
- the virtual network service agent N is built in the local network manager NM of the distributed management system and the virtual network service agent N customizes the multivendor integrated virtual network environment in addition to network management conforming to the standard for automatic configuration in the local network in coordination with the virtual network management server for managing and operating the multivendor virtual network.
- the network management manager in FIG. 40 is replaced with the network manager.
- the virtual network service agent N coordinates with the virtual network agent VNA and the virtual network management server and the virtual user agent VUA and the virtual network agents VNA distributed to the switches S1 . . . dynamically manage the virtual group registration/routing table VT distributed to the switches S1 in coordination with each other, thereby customizing the multivendor integrated virtual network environment of automatic handling of user's virtual network definition/setting, network resource use requests, and terminal move, addition, change, etc., to the user environment for automatic configuration.
- This enables the virtual network environment to be customized to the user environment at the local distributed management level at the standpoint of user H . . . efficiently in a multivendor virtual network management system.
- connection ports of virtual groups VG1 . . . are distributed to switches S1 . . . distributed over a network
- virtual group registration/routing table VT and virtual network agent VNA are placed in the switches S1 . . . . . in a distributed manner
- a user environment table 330 and a virtual user agent VUA are placed in the switches S1 . . . or terminal A1 . . . , B1 . . . , C1 . . . in a distributed manner
- a virtual network service agent N is built in a network management manager NKM for integrated management.
- a virtual network server is integrated into the virtual network management server M.
- the virtual network service agent N is built in the network management manager NKM for integrated management and the virtual network service agent N customizes the multivendor integrated virtual network environment in addition to network management conforming to the standard for automatic configuration in the integrated network management manager NKM, as shown in FIG. 45.
- the virtual network server is integrated into the virtual network management server M.
- the virtual network management server M, the virtual network service agent N, and a virtual network service table are placed in multivendor network management manager, as shown in FIG. 45.
- FIG. 40 show the roles/characters and functions of the agent.
- the virtual network management server M and virtual network service agent N of the virtual network management system are integrated into one.
- the network management manager in FIG. 45 is contained in the virtual network management system in FIG. 40.
- connection ports of virtual groups VGl are distributed to switches S1 . . . distributed over a network
- virtual group registration/routing table VT and virtual network agent VNA are placed in the switches S1 . . . . . in a distributed manner
- a user environment table 330 and a virtual user agent VUA are placed in the switches S1 . . . or terminal A1 . . . , B1 . . . , C1 . . . in a distributed manner.
- FIG. 37 connection ports of virtual groups VGl are distributed to switches S1 . . . distributed over a network
- virtual group registration/routing table VT and virtual network agent VNA are placed in the switches S1 . . . . . in a distributed manner
- a user environment table 330 and a virtual user agent VUA are placed in the switches S1 . . . or terminal A1 . . . , B1 . . . , C1
- a different system linkage/learning table 332 of a user environment setting area for each group in the virtual group registration/routing table VT is formed and linkage conditions of building automation utilities and utilities of a different system can be set.
- FIG. 42 in automatic response to user H1 . . . network resource use requests, terminal move, addition, change, etc., in accordance with constraints and rules of conflict detection/negotiation/plan correction/learning preset for a network environment for the agents, the virtual user agent VUA and the virtual network agents VNA distributed to the switches S1 . . .
- the virtual network agents VNA coordinate with a virtual network management server M for dynamically managing the virtual group registration/routing table VT distributed to the switches S1 thereby customizing linkage conditions of utilities UT of building automation BA and utilities UT of a different system for automatic configuration, autonomously observing the utility UT state, and learning optimum linkage conditions for automatic setting of the conditions.
- the different system linkage/learning table 332 of a user environment setting area for each group in the virtual group registration/routing table VT is formed and the linkage conditions of the building automation utilities and utilities of a different system can be set. As shown in FIG.
- the linkage conditions of the building automation utilities and utilities of a different system are customized in accordance with the constraints and rules of conflict detection/negotiation/plan correction/learning preset for the network environment for the agents, the utility UT state is autonomously observed, and the optimum linkage conditions are learned and automatically set.
- the different system linkage/learning table of a user environment setting area for each group in the virtual group registration/routing table VT may also be formed in a virtual network service table.
- a virtual network service agent N segments the resources of a different system into virtual groups and dynamically manages the virtual group registration/routing table VT distributed to the switches S1 . . . in coordination with the virtual network agent VNA and a different system management server, thereby customizing the linkage conditions of the building automation utilities and the utilities of the different system, autonomously observing the utility UT state, and learning optimum linkage conditions for automatic configuration.
- the facility environment state is autonomously observed and optimum linkage conditions are automatically set. For example, linkage of power outage/power recovery, access security machine, air conditioning, lighting, etc., on CRT display is optimized.
- the linkage conditions can also be set manually and are automatically tuned by a learning a function.
- FIG. 46 shows a concept in virtual network service positioning in the invention.
- FIG. 47 shows the virtual groups VG1 . . . and user environment, wherein NKUA denotes a utility virtual group in a network management system, NKUA' denotes a utility virtual group in another network management system, GW denotes a network computing virtual group, AS1 . . . denotes a different system, and NKS denotes a network management system.
- the network service server manages the agents of the switches S1 . . . and intercommunication with a network adopting a different communication system other than virtual groups.
- the agents manage the terminals in coordination with the virtual group agents VA of the switches S.
- the network service server and the virtual group agent VA of each switch S make up one coordination virtual group, and communication of virtual group VG with an external system is supported.
- the switch For multicast for each virtual group VG1 . . . with virtual group server VGS assigned to each virtual group VG1 . . . , according to multicast setting previously registered in the virtual group agent VA of the switch S by each server VGS for a multicast request issued to the server VGS from each client U and multicast processing performed by the server for each client, the switch stores a multicast message packet pointer in the virtual group queuing table 315 for multicast and executes multicast processing, whereby the switch S supports the multicast of virtual group VG in coordination with server VGS of each virtual group VG1.
- the switch may have a server function.
- the switch S For broadcast with virtual group server VGS assigned to each virtual group VG, according to broadcast setting previously registered in the virtual group agent VA of the switch by each server VGS so that if the server VGS can deal with a broadcast request issued from each client U by a protocol handled by the server VGS, it responds to the broadcast request or that if the server VGS cannot deal with the broadcast request, it forwards the request to router LT, the switch S stores a multicast message packet pointer in the broadcast queuing table 315 and forwards broadcast to the router LT, whereby the switch S supports the broadcast of virtual group VG in coordination with server VGS of each virtual group VG.
- the switch S operating as a virtual LAN group at the second layer level routes broadcast for virtual group VG, but depends on external router LT for communication with other than the virtual group VG.
- the switch with an ATM interface is connected to the ATM backbone, whereby virtual group relayed by the ATM switch 300 can be expanded via virtual LAN group at the second layer level emulated in ATM.
- the ATM switch 300 is compatible with multiprotocol and has virtual group agent VA, whereby a shared table is constructed in the ATM switches S1 . . . and virtual network groups at the third layer level and virtual custom groups can be supported and customized to a user environment.
- FIG. 48 shows another specific configuration example of switch S.
- virtual user agent VUA and virtual network agent VNA are built in the switch S and negotiation engine 337 between agents and agent rule engine 342 execute a coordination problem solving algorithm between the agents.
- the example differs from that in FIG. 35 in that the number of input ports/output ports is expanded by a packet bus 338 for packet multiplexing.
- the virtual user agent VUA is provided with a user command processing section 335 and a virtual distributed management section 334, and numeral 330a denotes an environment setting parameter in a user environment table 331.
- FIG. 49 shows another specific example of switch S.
- the example differs from that in FIG. 48 in that a packet in a cell buffer 341 is dissolved into cells by a cell conversion section 340 and that the cells are multiplexed by a cell bus 339.
- the cell bus 339 performs cell multiplexing for shortening the packet delay time, raising the bus utilization factor, and the band utilization factor.
- the cell bus 339 contains a repeater function like an ATM switching system and the number of input ports/output ports can be expanded. That is, in the example in FIG. 49, a switch function of a low-order layer than an ATM adaptation layer is shown from cell conversion to packet conversion; if ATM transmission is executed outside input ports 341 . . . or output ports 3121 . . . , an ATM addressing access method is supported and if an IEEE802 LAN is applied outside the input ports or output ports, data of the ATM adaptation layer or higher is handled.
- FIG. 50 shows another example of the virtual group registration/routing table VT
- FIG. 51 shows another example of the user environment table 330.
- the virtual group registration/routing table VT is called a cluster of various tables.
- the various tables contain the virtual group registration table 301, the client definition table 331, the virtual group routing table 308, the user environment setting table 318, the user environment table 330, and the different system linkage/learning table 332.
- the virtual group registration table 301 and the virtual group routing table 308 are shown separately, but are combined into a virtual group registration/routing table in FIG. 38. This difference is contained in the range in which it can vary depending on the installation within the claims of the invention with the same function/effect.
- FIG. 35 the virtual group registration table 301 and the virtual group routing table 308 are shown separately, but are combined into a virtual group registration/routing table in FIG. 38. This difference is contained in the range in which it can vary depending on the installation within the claims of the invention with the same function/effect.
- the client definition table 331 is pointed to by a pointer from the virtual group registration/routing table VT; as shown in FIGS. 50, 51 and 44, the virtual group registration/routing table VT, the user environment table 330, and the virtual network service table 333 are represented as independent tables. This is also contained in the range in which it can vary depending on the installation within the claims of the invention.
- the configuration of the invention is shown as logical configuration/function in the virtual networks in FIGS. 34, 37, and 51, and logically equivalent and physically different installation in one-to-one mapping is contained as shown in FIGS. 51 and 47.
- FIG. 40 shows that a user belongs to a plurality of virtual groups and is connected to a different server depending on the application or project.
- FIGS. 34, 39, and 51 represent virtual LAN groups (second layer level) as switched domains and communication between switched domains and broadcast wall as routing service between switched domains, and show placement of network service server and network management server among the switched domains.
- FIG. 52 shows a conceptual configuration of a distributed integrated wiring system of the invention, which can be adopted to the virtual LAN system according to the present invention.
- a building like an intelligent building system of an office, a plant, a hospital, etc. is divided into residential units and a local node 401 . . . for collecting functions of environment measurement, monitor, and control processes and an information communication process using local building facilities is provided for each residential unit.
- a local node la similar to the local node 401 . . . is provided in a floor integrated wiring closet 402.
- the local nodes 401 and 401a are connected to each other by floor trunk lines 403 . . .
- the local nodes 401a provided in the floor integrated wiring closets 402 are connected to a center node 405 via backbone wiring 404, and the center node 405 is connected to an external system over a public switched network 406.
- the center node 405 is made up of a common network service server 450 of the entire building and integrated network service equipment 451. As common resources and service of the entire building, the common network service server 450 bears common building facility service 450a and common information communication service 450b, as shown in FIG. 54(a).
- the integrated network service equipment 451 is made up of a monitor unit 452, a trunk line facility control unit 453, a trunk line concentration unit 454 including a multiplex circuit, a switch or the like, and a WAN connection unit 455.
- the monitor unit 452 corresponds to a center control console 452a
- the trunk line facility control unit 453 corresponds to common building facility resources 452b
- the trunk line concentration unit 454 corresponds to common information communication facility resources 452c, as shown in FIG. 54(a).
- the local node 401, 401a . . . is made up of a local network service server 410 and distributed network service equipment 411, which consists of a monitor unit 412, a branch line facility control unit 413, a branch line concentration unit 414, and a trunk line connection unit 415 as shown in FIG. 53.
- the local network service server 410 of the local node 401, 1a bears local building facility service 410a and local information communication service 410b, as shown in FIG. 54(b).
- the monitor unit 412 corresponds to a local control console 412a
- the branch line facility control unit 13 corresponds to local building facility resources 413a
- the branch line concentration unit 414 (trunk line connection unit 415) corresponds to local information communication facility resources 414a, as shown in FIG. 54(b).
- the branch line concentration unit 414 of the local node 401 provided in each residential unit is connected via a floor branch line 407 to a zone wiring box 408 to which outlets 409 are connected.
- the distributed network service equipment 411 of the local node 401 provided in each residential unit is housed in an equipment storage unit 421.
- the backbone wiring 404 and the floor trunk lines 403 are housed in a conduit tube 420.
- network service is divided into the three types of areas of the entire building, the entire floor, and each residential unit in the floor.
- the common network service server 450 of the entire building is entered in the center node 405
- the local network service server 410 common to the floor is entered in the local node la of the floor concentrator
- the local network service server 410 of each residential unit is entered in the local node 401 of the residential unit.
- the network service is divided into the entire building and floors, the local network service server 410 is not entered in the local node 401 of the residential unit and only the distributed network service equipment 411 is entered.
- the local network service server 410 common to the floor normally becomes unnecessary in the local node la of the floor concentrator. However, it is expected that the local network service server 410 common to the floor bears a backup role of the center node 405.
- the local nodes 401 and 401a of floors and residential units in which the local network service server 410 is entered form independent networks.
- FIGS. 55 and 56 show the installation configuration of the embodiment.
- ceiling beams are deep and an access floor is constructed as a high floor for the strength of a building structure and a flat floor. From this point, equipment storage units and electric wire units are placed below the access floor. In this case, the ceiling height for each story must be taken high for a large ceiling space above a suspended ceiling and placement of an access floor, thus the building becomes high for considering the number of stories, increasing costs.
- a floor 31 of the portion where equipment storage units 421 and wiring storage units 421A are installed is not a flat face of a conventional slab and concrete forming like a ceiling turned upside down, as shown in FIG. 55.
- a member 31a for water resistance, heat insulation, etc., is put if necessary.
- the equipment storage units 421 and wiring storage units 421A hold flatness as a floor like an access floor and sound and vibration insulation functions are added.
- a beam 433 like projecting above the floor face is disposed, a ceiling beam 433 is made small to a necessary minimum, and the building strength is maintained.
- a floor material 430 is fitted detachably so as to support on the upper ends of projection bodies 432 of parts of the beam 433 and a so-called access floor is formed with wiring space and storage space provided between the floor material 430 and the beam 433.
- a distributed BA controller 422, a distribution panel 423, and distributed information wiring equipment 424 controlled at the local node 401 are stored in the equipment storage unit 421, and power wiring 425 and BA wiring 426 are placed in the equipment storage unit 421 storing the distributed BA controller 422 and the distribution panel 423.
- the floor material 430 as a lid of the equipment storage unit 421 can be opened and closed. The stored units can be maintained and inspected by removing the floor material 430 and opening the equipment storage unit 421.
- the zone wiring box 408 is attached to the lower face of the closed floor material 430 for one of the equipment storage units 421 and is connected to the outlet 409 placed on the floor.
- the wiring storage unit 421A below the floor is placed so as to penetrate the equipment storage unit 421, and the floor trunk lines 403 and the floor branch lines 407 as information wiring are put via the conduit tube 420.
- the local network service server 10 and the distributed network service equipment 411 making up the local node 1a are stored in the floor integrated wiring closet 402 located on the floor.
- the distributed network service equipment 411 is connected to the floor trunk lines 403 put below the floor and is also connected to the backbone wiring 404 put in EDO penetrating the building from top to bottom.
- An operation panel 427 of the distributed BA controller 422 and the distributed information wiring equipment 424 stored in the equipment storage unit 421 below the floor is taken out by information wiring using the outlet 409 at a proper location on the wall face or desktop as shown in FIG. 55, whereby the unit state can be monitored and controlled without opening the lid of the equipment storage unit 421.
- Illuminators 435 and supply openings of air conditioning piping 436 are disposed in a ceiling 434 and power lines 437 and air conditioning piping 436 are disposed in a space between the ceiling 434 and the beam 433.
- FIG. 56 is an exploded perspective view of the equipment storage unit 421 portion, partially broken away.
- stored equipment main units 438 are formed according to the standard 19-inch rack mount size and are stored in the equipment storage unit 421 longitudinally.
- the equipment storage unit 421 is provided with as many guide rails 439 (which may be grooves) as the number of housed units as guides used when the equipment main units 438 are housed or taken out for wiring on inner wall faces and a placement section 441 for placing the peripheries of front panels 440 of the equipment main units 38 on the slightly lower side than the opening and is formed with screw holes 443 for threadably engaging fixing screws 442 passed through the front panels 440.
- the placement section 441 is formed with screw holes 444 for threadably engaging mounting screws 445 made in the floor material 430 as a lid.
- the periphery of the floor material 430 can be placed on a step part 421a of the opening of the equipment storage unit 421 made of a soundproofing floor material for forming a flat face together with peripheral soundproofing material.
- ends of a power wiring cable conduit tube 420a, a BA wiring cable conduit tube 420b, and an information wiring cable conduit tube 420 are opened in a partition from the adjacent unit 421 or 421A.
- numeral 446 is a grip.
- the wiring storage unit 421A also has a similar structure for enabling the floor material 430 as a lid to be attached to the opening.
- FIG. 57 is a flat wiring block diagram of a corridor portion of a common portion of a floor.
- the center is an elevator floor EF on which elevators ELV are placed, and floor integrated wiring closets 402 for housing the local nodes 1a are placed in EPS 460 in opposed corners.
- the equipment storage units 421 for housing the local nodes 401 are placed below the elevator floor EF and the wiring storage unit 421A containing the conduit tubes 420, 420a, and 420b are placed below the floor between the equipment storage units 421.
- the zone wiring box 408 is disposed below the floor of each residential unit and the outlet 409 is connected to the zone wiring box 408.
- PS denotes a shaft.
- the local network service server 410 and the distributed network service equipment 411 of the local node 401 are thus placed in the equipment storage units 421 for autonomously performing distributed control of the environment of the corresponding residential unit.
- the local network service server 410 and the distributed network service equipment 411 of the local nodes 401a are placed in the floor integrated wiring closet 402.
- the distributed BA controller 422 and the distributed information wiring equipment 424 are stored in the equipment storage unit 421 below the floor, as shown in FIG. 55.
- a switchboard normally placed in a room is also installed in the equipment storage unit 421 below the floor if it may be placed anywhere other than such a room managed by a building administrator.
- FIG. 58 shows the configuration of the center node 405 and the local nodes 401 and 401a used with the system of the embodiment.
- the common network service server 450 and the integrated network service equipment 451 are installed in the center node 405.
- the common network service server 450 contains application software and databases of common information communication service related to access to the internet, WAN connection, and message communication across the entire building and common building facility service of energy saving, BA, disaster prevention, crime prevention, etc.
- Integrated in the integrated network service equipment 451 are the WAN connection unit 455 and the trunk line concentration unit 454 as the common information communication facility resources 452c of common service resources required for providing common network service and centralized management, the trunk line facility control unit 453 as the common building facility resources 452b, and the monitor unit 452 for executing communication, control, and monitor functions required for use of command and entire systems, common service, and centralized management.
- the WAN connection unit 455 contains a fire wall 456 and a main router 457, forming a communication interface with the outside of the building.
- the trunk line concentration unit 454 contains a backbone switch 458, an intranet router 459, and a VLAN learning/identification/filtering section 461.
- the intranet router 459 handles a routing protocol in the enterprise separated from the outside by the fire wall 456.
- the VLAN learning/identification/filtering section 461 encapsulates and decapsulates packets for tunneling for transferring VLAN via the internet or WAN and learns and filters connection route addresses for a terminal move, addition, or change.
- the backbone switch 458 has redundancy using known techniques of layer 402, 403 switching or an ATM switch, etc., in combination and supports a function of multiplex transmission of information requiring high reliability and immediacy such as BA or disaster prevention with any other data communication to the backbone. For this purpose, the QoS function of the ATM switch is promising.
- the center control console 452a for network management, BA management, and disaster prevention/security management is connected to the monitor unit 452, as shown in FIG. 58.
- the local network service server 410 contains application software and databases of network service for each residential unit such as the network service function of the local building facility service 410a such as office residential environment service of air conditioning, lighting, etc., and the local information communication service 410b of virtual network configuration, etc., for setting a multicast group such as an electronic conference using multimedia or providing virtual common information space different from physical placement through a network.
- a trunk line switch 462, a virtual routing table 463, and a router bridge 464 make up the trunk line connection unit 415 and a branch line switch 465 is contained in the branch line concentration unit 414 as the local information communication facility resources 414a used as resources for providing the local network service.
- the router bridge 464 is forwarded by the switch as layer 402, 403 switching. Further, in the distributed network service equipment 411, a local controller section 466 of BA is contained in the branch line facility control unit 413 as the building facility resources 413a, and the monitor unit 412 executes the communication, control, and monitor functions for providing local resident service under local conditions autonomously.
- the monitor unit 412 contains a local management agent 467 for also executing network management according to the SNMP protocol.
- VLANs also contain virtual groups based on not only layer 402 addresses, but also layer 403 addresses or user-defined tags.
- VLAN virtual network
- W1 business 4100, W2 business 4101, W3 business 4102 (W4 business 4108, W business 4109), and I1 information 4103 connected to the branch line switch 465 denote terminals of business and information system groups, and these groups can be logically configured by a VLAN.
- L1 lighting 4104, S1 sanitation 4105, and A1 air conditioning 4106 connected to the local control section 466 also denote terminals for building facilities and form a LAN according to the communication control traffic type and spatial classification of residential units, etc.
- an M1 operator console 4107 connected to the local management agent 467 is an operation panel of residential units, wiring closet, etc.
- building facility units and information communication facility units are distributed, network service is integrated in residential units or floor units, VLAN is formed according to the communication control traffic type of each of the building and information communication facility units and spatial classification of residential units, etc., and an office residential environment and network service of the building and information communication facility units can be reconfigured flexibly in free layout in response to a work group move, addition, or change.
- FIG. 58 it seems that the system comprising the center node and the local node in FIG. 58 is simlar to the system comprising the local intranet segment and the global internet segement in configulation. It seems that the local node corresponds to the local switch in FIG. 18, and the intranet router to the local router switch in FIG. 18 respectively.
- FIG. 59 shows a specific configuration of the distributed network service equipment 411 used with the embodiment.
- the intranet routing/bridge protocol processing section 482 is provided with a function of converting into a LAN packet by LAN emulation from ATM and performing virtual router processing by MPOA of upper layer and function of being capable of handling standard protocols such as 1-PNN1 and IP connection (RFC1577).
- the client addresses of virtual groups and the virtual group IDs can be set in virtual group registration tables 486 and virtual routing tables 485 of the distributed network service equipment 411.
- a local packet is filtered to the main router of the WAN connection unit 455 of the integrated network service equipment 451 so as to forward the packet from the distributed network service equipment 411 to the main router only when the destination virtual group ID is not a virtual group ID at a local site. If the destination virtual group ID is a virtual group ID at a local site, the packet is unicasted to the port of the destination client address.
- update information of the virtual group registration table 486 or virtual routing table 485 is multicasted to the distributed network service equipment 411 with high priority, whereby the distributed network service equipment 411 performs distributed processing of local virtual group routing calculation.
- Route calculation processors of the distributed network service equipment 411 share an intranet routing table of local virtual group and parallel control kernel sections (not shown) of the distributed network service equipment 411 exchange the intranet routing table information in shared memories in synchronization with each other for maintaining the optimum virtual group routing tables 485.
- a virtual group identification section 487 codes client addresses 401 and 402 together by a hash function and collates the hash function with a virtual group configuration table coded by hash functions, so that an increase in the delay time does not introduce a problem as compared with the format of adding a header or tag to a packet.
- the virtual group identification section 487 collates a pair of MAC addresses 401 and 402 of the packet destination and source with the virtual group configuration table and identifies a virtual group containing both the MAC addresses.
- the virtual group identification section 487 collates a pair of network addresses 401 and 402 of the packet destination and source with the virtual group configuration table and identifies a virtual group containing both the network addresses.
- the virtual group identification section 487 collates a pair of application addresses 401 and 402 of the packet destination and source with the virtual group configuration table and identifies a virtual group containing both the application addresses.
- the client name is entered in a virtual group registration/routing table (into which the tables 485 and 486 are combined) in FIG. 61(a).
- a virtual group registration/routing table into which the tables 485 and 486 are combined
- Different client names can be entered for each virtual LAN group, each virtual network group, and each virtual custom group. If a virtual LAN group, virtual network group, and virtual custom group are defined for one MAC, virtual group definition rows, virtual network group definition rows, and virtual custom group definition rows are contained in the virtual group registration/routing table in FIG. 61(a). Further, a pointer to a client definition table 4103 shown in FIG. 61(b) is contained.
- the virtual group identification section 487 collates addresses with the virtual group registration table 402 in the order of the virtual custom group definition rows, the virtual network definition rows, and the virtual group definition rows.
- the machine type is also entered in the client name so that the client name is also the identification code of the machine type such as switch or terminal.
- a virtual group distributed management section 488 enters the MAC address directly connected to a port of the switch or indirect connection in a switch connection map 489. Connection map information of the entire network is provided by using the virtual group registration table 486 and the switch connection map 489 in combination. Since connection of adjacent ports is seen, topology is drawn on a connection relation chart, which is called a map. If topology is a tree structure, route search is easy to make. If topology is meshes, distances of routes as transmission time need to be compared. If switches having the same transmission speed are connected at multiple stages, the number of stages is assumed to be the distance.
- connection port address is entered in the virtual group registration/virtual group routing table shown in FIG. 61(a) as the routing connection port. That is, in the distributed switch configuration, another switch is cascaded to a port of one switch, thus for the port to which a switch is connected, the connection port becomes a port name corresponding to the optimum route reading to the home switch to which the terminal is connected.
- the intranet virtual group learning/identification section 490 sends a topology change message to the virtual group distributed management section 488, which then learns in response to a user environment message according to a user request and the topology change and dynamically updates the virtual group routing table 485.
- the virtual group identification section 487 collates a pair of client addresses 401 and 402 of the packet destination and source with the virtual group configuration table and identifies the virtual group containing both the client addresses of the packet destination and source.
- the virtual group learning section 487 dynamically executes automatic configuration management for a terminal move.
- the virtual group learning section 16 outputs a port change message and the intranet virtual group learning/identification section 490 dynamically updates the virtual group registration table, thereby executing automatic configuration management dynamically.
- Client addresses and the priority for each virtual group can be set in the virtual group registration/routing table of each group in the switch as shown in FIG. 61(a).
- a virtual group control section 491 allocates a band of each traffic type of unicast, multicast, and broadcast in group units in response to the virtual group priority.
- a forwarding section 492 in the branch line switch 465 forming the branch line concentration unit 414 transfers a packet to a specified output port 493a . . . of an output access control section 493 by scheduling control of the virtual group control section 491.
- the forwarding section 492 consists of processing functions of sending plan 492a, connection control 492b, unicast sending processing 492c, and multicast segment switch 492d.
- the virtual group identification section 487 of each switch has the intranet virtual group learning/identification section 490 for collating input port 494a . . . and the packet source address with the virtual group registration table 486, detecting topology change such as a terminal move, and automatically updating the virtual group registration table 486 and the virtual group routing table 485.
- the virtual group distributed management sections 488 of the distributed network service equipment 411 as virtual group agents dynamically manage the virtual group registration tables 486 and the virtual group routing tables 485 distributed to the switches in coordination with each other based on topology change detection of a terminal move, a switch move, etc., whereby virtual groups are shared among the distributed network service equipment 411 in the network.
- Virtual group agents distributed to the distributed network service equipment 411 can also be installed in virtual group servers each acting as a representative in virtual group units or for a virtual group cluster.
- the virtual group servers can manage the agent state and mediate communication between the agents and also dynamically manage the virtual group registration tables 486 and the virtual group routing tables 485 in coordination with each other as a VLAN switch agent function.
- the virtual group registration tables 486, the client definition tables 4103 shown in FIG. 61(b), and the virtual group routing tables 485 updated and managed in the virtual group servers are cached in the distributed VLAN switches and the virtual group sever distributes change information in the tables to the distributed network service equipment 411.
- the branch line concentration unit 414 of the distributed network service equipment 411 connected to the floor trunk line 403 or floor branch lines 407 performs packet switching, temporarily stores the packet in a packet buffer 495a of a buffer memory 495, and sends the packet to the forwarding section 492 on a packet bus 496.
- a buffer management section 495b sends a packet pointer to virtual group queuing 497a, broadcast queuing 497b, and unknown group queuing 497c of a buffer pointer queuing table 497.
- the distributed network service equipment 411 of the embodiment is characterized by the fact that a branch line facility local controller 498 forming the local control section 466 of the branch line facility control unit 413 controls the building facilities and that the branch line facility local controller 498 and LAN are integrated into a virtual group by a branch line facility control VLAN connection proxy 99; protocol conversion between the facility system and LAN is executed in a proxy conversion table 100.
- a facility management proxy agent 4101 bridges the local management agent 467 of the monitor unit 412 and the branch line facility local controller 498 for supporting control state monitor from the local operator console connected to a console control section 467a and integrated management of BA management, network management, disaster prevention/security management, etc., from the center node 405.
- the local management agent 467 has an MIB (RMON) section 467b.
- numeral 4102 is a switch communication protocol control section for performing protocol control of switch communication in the distributed network service equipment 411.
- the switch communication protocol control section 4102 receives a virtual service management message and a virtual group message from the virtual group distributed management sections 488.
- FIG. 60 shows a more detailed configuration of the integrated network service equipment 451 used with the embodiment. Since the backbone wiring 404 is ATM, the backbone switch 458 of the trunk line concentration unit 454 performs cell switching.
- the integrated network service equipment 451 has the same functions as the distributed network service equipment 411.
- the monitor unit 452 comprises an integrated management agent 4105 corresponding to the local management agent 467.
- the integrated management agent 4105 has a console control section 4105a and an MIB section 4105b corresponding to the console control section 467a and the MIB section 467b of the local management agent 467.
- the WN connection unit 455 comprises a backbone buffer memory 4105.
- the trunk line concentration unit 454 comprises an input access control section 494, a buffer pointer queuing table 497, a forwarding section 492, an output access-control section 493, and a buffer memory 495 like the branch line concentration unit 414.
- the buffer memory 495 comprises a cell buffer 495a', a packet conversion cell conversion section 495c, and a buffer managment section 495b for cell switching, and cells are sent to the forwarding section 492 on a cell bus 496'.
- the trunk line facility control unit 453 comprises a trunk line facility control VLAN connection proxy 499' corresponding to the branch line facility control VLAN connection proxy 499 of the branch line facility control unit 413, a facility management proxy agent 4101' corresponding to the facility management proxy agent 4101, and a branch line facility controller 498' corresponding to the branch line facility controller 498.
- the trunk line concentration unit 454 has an intranet routing/bridge protocol processing section 470 forming the VLAN learning/identification filtering section 461 and the intranet router 459, a virtual group identification section 487, a virtual group distributed management sections 488, a switch communication protocol control section 4102, virtual group routing tables 485, virtual group registration tables 486, and the client definition tables 4103 like the trunk line concentration unit 415 of the distributed network service equipment 411. Circuit parts identical with or similar to those previously described with reference to FIG. 59 are denoted by the same reference numerals in FIG. 60 and will not be discussed again.
- the intranet routing/bridge protocol processing section 470 of the intranet router 459 prepares a routing table containing learning filtering 471A, 471B of layer 402 and 403 addresses, the table is cached in the virtual group routing table (cut-through table) 485 of the virtual group distributed management sections 488, input packet is cut through, and the intranet routing/bridge protocol processing section 470 is bypassed.
- the intranet routing/bridge protocol processing section 470 converts into a LAN packet by LAN emulation from ATM in conformity with the ATM forum standard and performs virtual router processing by MPOA of upper layer.
- the intranet routing/bridge protocol processing section 470 contains LAN emulation 474, IP connection (RFC1577) MPOA 475, and route calculation 476 so as to be able to handle standard protocols such as 1-PNN1 and IP connection (RFC1577).
- VLAN as a local intranet segment and a global internet segment are separated, routing of VLAN as an intranet segment is processed in the intranet routing table of the distributed network service equipment 411 close to a desktop, packets are filtered so that only internet segment traffic is sent to the ports to which the main router is connected, and the main router of the WAN connection unit 455 of the integrated network service equipment 451 processes routing connected to the internet or LAN in the internet routing table.
- LAN of the backbone wiring 404 and the floor trunk lines 403 provides reliability and immediacy required for multiplexing information communication of the business (account) system and building facility control and monitor by dividing into virtual groups and classifying according to priority.
- QoS is supported by adopting ATM for the backbone wiring 404 and the floor trunk lines 403, the reliability and immediacy can be guaranteed sufficiently.
- QoS is supported to desktops by also adopting ATM for the branch line system.
- backbone wiring 404 and the floor trunk lines 403 are desired to meet information transmission quality, namely, satisfy requirements depending on information such as reliability, emergency, delay time guarantee, high speed, and expandability
- the ATM is appropriate for the backbone wiring 404 and the floor trunk lines 403.
- a system other than the ATM such as function division by transmission quality level with more than one optimum high-speed Ethernet or a demand priority system, can also be used depending on the balance between costs and performance.
- the information communication facility equipment and electric facility equipment can be distributed, thus a scalable IT infrastructure can be constructed at low costs.
- floor space is divided and a comfortable environment optimum for the user integrating a virtual network and BA facility equipment can be autonomously localized for each local residential space and be customized in accordance with user requirements.
- Places that can be accessed from shared space such as space below a floor is used for distributed placement and when a machine is added or changed, the effect on the residents of the building can be lessened; particularly, the system is installed below a floor, effective use of space can be made for reducing switchboard space on the floor wall face or EPS space and increasing residential space.
- a twenty-ninth embodiment of the invention has a similar wiring structure to that of the twenty-eighth embodiment and has a system configuration as shown in FIG. 62.
- the twenty-ninth embodiment is a system configuration example of common/local network service for providing a more intelligent network service function.
- integrated network service equipment 451 in a center node 405 contains an integrated management agent 4201, a virtual network agent 4204, a virtual network service agent 4202, and a virtual user agent 4203, and a common network service server 450 in the center node 405 contains a common network management server 4500, a common information communication service server 4501, and a common building facility service server 4502.
- distributed network service equipment 411 in a local node 401 or 401a contains a local management agent 4300, a facility management proxy agent 4301, a virtual network agent 4302, a virtual network service agent 4303, a virtual user agent 4304, and an integrated management agent 4305, and a local network service server 410 contains a local network management server 4306, a local information communication service server 4308, and a local building facility service server 4307.
- a trunk line facility control unit 453 is built in the integrated network service equipment 451, as shown in FIGS. 61(a) and 61(b), and common building facilities are also connected to the side of floor trunk lines 404.
- a trunk line facility control VLAN connection proxy 499', a proxy conversion table 4100, a facility management proxy agent 4101', and a trunk line facility controller 498' are also built in the integrated network service equipment 451.
- This configuration is a configuration wherein the floor branch lines 407 of the branch line facility control unit 413 shown in FIG. 58 are replaced with floor trunk lines 404.
- the lines are connected to integrated management agent, a virtual group identification section 487, a buffer 495, and an intranet routing/bridge protocol processing section 470.
- numeral 4150 is a local building facility system which consists of a lighting subsystem 41501 for monitoring and controlling lighting load, an air conditioning subsystem 41502 for monitoring and controlling air conditioning facilities, a power distribution subsystem 41503 for monitoring and controlling wiring facilities, a disaster prevention subsystem 41504 for monitoring and controlling disaster prevention facilities, a safety subsystem 41505 for monitoring and controlling safety facilities, and a video subsystem 41506 for monitoring and controlling video machines.
- Numeral 4151 is a network management manager
- numeral 4152 is a building management manager
- numeral 4153 is an enterprise server
- numeral 4154 is a department server
- numeral 4155 is a facility management server.
- Numeral 4156 denotes a client connected to a zone wiring box 408.
- FIG. 63 is an operation illustration when virtual group agents are used in the second embodiment of the invention.
- the agents perform automatic coordination problem solving so as to provide a total user environment of building facilities and information communication for residential unit HU and flexibly respond to a user move, addition, or change in free layout.
- the common building facility service server 4502 of the common network service server 450 provides system management information and utilities
- the common information communication service server 4501 integrates virtual network services and provides a virtual network function
- the common network management server 4500 provides network management information and a management function.
- the local building facility service server 4307 of the local network service server 410 has a conversation with a common building facility management system via the integrated network service equipment 451 and the local information communication service server 4308 integrates virtual network services and provides a virtual network function and has a conversation with a common information communication system.
- the local network management server 4306 has a conversation with a network management system via integrated network service equipment 405.
- the virtual network service agent 4303 of the distributed network service equipment 411 integrates virtual network services, provides a virtual network function, and coordinates with the virtual network agent 4302 for making coordination problem solution between the agents.
- the virtual network agent 4302 provides virtual network service, learns and corrects a virtual group registration table/routing table, and sets a network environment.
- the virtual user agent 4304 provides virtual network service, GUI, and options, learns a user environment, and corrects a user environment table in response to a user H request or in coordination with user H.
- virtual services A-C of virtual groups VA-VC and a client 4156 construct a customized virtual network environment for providing a virtual network environment for user H and a local building facility environment.
- FIG. 46 shows virtual network service positioning in the embodiment.
- An information system is constructed by network computing, a user environment system, system management, and building management.
- An information environment is made up of virtual networks.
- Virtual network service exists between the information system and the information environment.
- information wiring consists of hub, ATM switch, router, structured wiring system, and dedicated control bus.
- Information resources include hardware and software of computer, multimedia, database, data warehouse, online transaction processing, etc., and a local building facility system, etc.
- the virtual network service positioning shown in FIG. 46 indicates positioning of application for providing a total environment of building facilities and information communication viewed from the user according to the invention.
- a user environment system at the standpoint of the user can be provided by virtual network service integrating the system information resources of network computing, system management, building management, facility management, etc., into local distributed network service equipment 411 and local network service server 410 like a residential unit HU.
- An information environment in which user H can customize a comfortable environment in free layout in response to change in organization units such as single rooms/work groups as residential units HU integrating other systems of BA, etc., locally autonomously is provided as virtual network service.
- FIG. 42 shows the agent operation as the system configuration of the agents of the embodiment. It is generally understood that an actual solution is always found under constraints such as rules and that the convergence time to the solution is shortened.
- FIG. 64 shows the relationship between virtual groups and user environment.
- Virtual group registration/routing table image 4500 contains virtual network service table image 4501 containing a service linkage/learning table of information communication/building facilities Ry1 . . . and network management system MZ1, client definition table image 4502 containing virtual groups Vx1 . . . , and user environment table image 4503 consisting of clients U1 . . . having information communication/building facility service virtual groups V1 and V2, network computing virtual group 4503b consisting of services A to C, and network management virtual group V3.
- network environments Ry1 . . . of building facilities and information communication are related to the virtual groups Vx1 .
- service is provided through the virtual groups; local service and common service are provided for each user/residential room autonomously from the local network service server 410, as shown in FIG. 63. Viewed from each user/residential room, distinction between the local service and common service is not considered and the common service is provided from the local network service server 410 having a conversation with the common network service server 450, whereby autonomy of a local node is raised and coordination between the agents is limited to the local range, thus speedy convergence is enabled in response to a user request.
- coordination problem solving by agents between servers as shown in FIG. 42 is also executed in a conversation between the common network service server 50 and the local network service server 410 and is divided into cycles of coordination problem solving at local level and coordination problem solving at server-to-server level facing common/local backbone for constructing a configuration of a 2-layer agent system, more advanced flexible service can be provided and moreover coordination problem solving cycle in local node below the local network service server 410 is divided, thus convergence is speeded up and fine service can be provided to the user level.
- FIG. 65 shows distributed network service equipment 411 of the embodiment using a packet switch.
- the distributed network service equipment 411 of the embodiment basically has the same configuration as the distributed network service equipment 411 of the first embodiment; the former differs from the latter in that a virtual user agent 4203 is provided in place of the intranet routing/bridge protocol processing section and that a virtual network service agent 4202 and a virtual network agent 4204 are provided.
- Sending processing 492c' of a forwarding section 492 corresponds to unicast/multicast.
- the virtual user agent 4203 consists of a user command processing section 4203a, a virtual user distributed management section 4203b for conflict detection/plan correction, and a user environment table 4203d into which environment setting parameters 4203c are written.
- the virtual network service agent 4202 consists of a negotiation engine between agents 4202a, an agent rule (constraint) engine 4202b, a virtual network service table 4202c, and a virtual group distributed management section 488 shared with the virtual network agent 4204.
- the virtual network agent 4204 consists of a virtual group learning section 490, client definition tables 4103, virtual group registration tables 486, a virtual group control section 491, virtual group routing tables 485, and a virtual group distributed management section 488.
- FIGS. 66(a) to 66(c) show tables used with the embodiment.
- a virtual group registration/routing table (providing the virtual group registration table 486 and virtual group routing table 485) in FIG. 66(a) is a table for managing routing information containing virtual group name, packet address, and switch port name for layer 402, 403 switching; it is placed in local node 401 or 401a.
- a user environment table/residential unit environment table in FIG. 66(b) is a table for managing transmission quality (QoS) for providing a network environment of information communication facilities in response to traffic demand for each virtual group; it is placed in local node 401.
- QoS transmission quality
- a virtual network service table (service linkage/learning table) in FIG. 66(c) is a table for managing a virtual group of facilities for controlling information communication/building facility machines and providing a residential environment; it is placed in local node 401 or 401a.
- FIGS. 66(a) to 66(c) are also placed in the center node 405 as management tables defined as common virtual groups like residential units.
- the following management functions of the entire building are contained as common service managed in the virtual network service table in FIG. 66(c):
- Destination display function of application of a system in which distributed installation unit is provided with terminal origination function of PHS and installation position can be automatically determined in block units, namely, PHS roaming function.
- the virtual group agent is made up of the three types of agents different in role or character: Virtual user agent 4304, virtual network agent 4302, and virtual network service agent 4303.
- the virtual group registration/routing table as shown in FIG. 66(a) and the virtual network agent 4302 are placed in switches in a distributed manner, and the residential unit environment table as shown in FIG. 66(b) and the virtual user agent are placed in the switches or terminals in a distributed manner.
- the virtual network service agent 4303 and the virtual network service table as shown in FIG. 66 (c) are placed in the virtual network service agent 4303 in the distributed network service equipment shown in FIG. 60.
- the virtual network service agents 4303 customize the environment to a user environment of a residential unit environment autonomously in conversation with the local network service server.
- the virtual network service agent 4303 coordinates with the virtual network agent 4302 and the virtual network management server and the virtual network service agent 4303, the virtual user agent 4304, and the virtual network server distributed to the switches coordinate with each other for dynamically managing the virtual group registration/routing table distributed to the switches, thereby autonomously customizing QOS (quality of service) of transmission band, delay time, etc., to the user environment of the residential unit environment for each virtual group in response to user demands and customizing the virtual network environment of user's VLAN network definition/setting, network resource use requests, and terminal move, addition, change, etc., to the user environment for automatic configuration.
- QOS quality of service
- the client addresses of the virtual groups and a user environment can be set in the virtual group registration/routing table.
- the virtual group agents distributed to the switches dynamically manage the virtual group registration/routing table in coordination with each other in automatic response to user's network resource use requests, terminal move, addition, change, etc., in accordance with constraints and rules of conflict detection/negotiation/plan correction/learning preset for the network environment for the agents, thereby customizing network management and network service to the user environment and customizing the virtual network environment of user's virtual network definition/setting, network resource use requests, and terminal move, addition, change, etc., to the user environment of the residential unit for automatic configuration.
- the virtual group agent is made up of the three types of agents different in role or character: Virtual user agent 4304, virtual network agent 4302, and virtual network service agent 4303, as shown in FIG. 63.
- the agents customize the virtual network environment to the user environment for automatic configuration in coordination with each other as shown in FIG. 42.
- the network service server manages the agents of the switches and intercommunication with a network adopting a different communication system other than virtual groups.
- the agents manage the terminals in coordination with the agents of the switches.
- the network service server and the agent of each switch make up one coordination virtual group, and communication of virtual group with an external system is supported.
- the switch For multicast for each virtual group with virtual group server assigned to each virtual group, according to multicast setting previously registered in the virtual group agent of the switch by each server for a multicast request issued to the server from each client and multicast processing performed by the server for each client, the switch stores a multicast message packet pointer in the virtual group queuing table for multicast and executes multicast processing, whereby the switch supports the multicast of virtual group in coordination with server of each virtual group.
- the switch may have a server function.
- the switch For broadcast with virtual group server assigned to each virtual group, according to broadcast setting previously registered in the virtual group agent of the switch by each server so that if the server can deal with a broadcast request issued from each client by a protocol handled by the server, it responds to the broadcast request or that if the server cannot deal with the broadcast request, it forwards the request to router, the switch stores a multicast message packet pointer in the broadcast queuing table and forwards broadcast to the router, whereby the switch supports the broadcast of virtual group in coordination with server of each virtual group.
- the switch operating as a virtual LAN group at the second layer level routes broadcast for virtual group, but depends on an external router for communication with other than the virtual group.
- a virtual LAN system forms: a virtual group which is based on elements having physical attribute or logical attribute and constituting a virtual LAN, sets a client address and priority of the virtual group in a virtual group registration table; and allocates unicast and broadcast traffic bands in group units.
- a VLAN can be provided without changing already existing packets and already existing terminals can be built in virtual groups with no change.
- the LAN switch is provided with the virtual group agent for forming a virtual group for each terminal based on characteristics of a packet without adding an extra header or tag to the packet and independently of LAN switch ports, setting the client address and priority of the virtual group in the virtual group registration table, allocating unicast and broadcast traffic bands in group units, and executing dynamic automatic configuration management for a terminal move by the virtual group learning circuit.
- a VLAN can be provided without changing already existing packets and already existing terminals can be built in virtual groups with no change.
- the LAN switch is provided with the virtual group agent for entering the optimum connection port address indicating which port of each of distributed LAN switches which virtual group is connected to in the virtual group routing table, thereby cascading the LAN switches to the ports, allocating a plurality of virtual groups for each port, entering the MAC addresses of members for each virtual group, and selecting an optimum routing path between ports of each virtual group.
- virtual custom group setting wherein medium access methods, communication protocols, and application are mixed is enabled, and the virtual group configuration with the server covering different types of terminals and protocols as a nucleus is supported.
- the virtual group agents distributed over the LAN switches dynamically manage the virtual group registration tables distributed over the switches in cooperation with each other.
- a virtual group can be automatically configured dynamically even for a terminal move.
- the virtual group agents of the LAN switches can automatically correct the virtual group configuration and optimum routing path in cooperation with each other, and further QOS (quality of service) is guaranteed by priority processing in virtual group units of applications, projects, etc.
- the port segment switching system may be adopted in the first aspect of the invention.
- the port segment switching system is capable of reconfiguring a plurality of ports that one or more switching hubs have as physical microsegments different from each other for transmitting and receiving a packet in microsegment units to which switching hub ports belong and combining switching hub ports arbitrarily for setting a common microsegment to the switching hubs.
- packets are transmitted and received between ports registered as microsegment members as if they were virtual repeaters sharing media, so that an independent microsegment in port units can also be shared among switching hubs at remote sites and moreover each microsegment can be set in port units.
- an efficient network can be easily constructed independently of the terminal types, network addresses, etc.
- a network switching system which is adopted to the first aspect of the invention, comprising local switches for processing routing in VLANs as local intranet segments, a main router for processing routing in global internet segments, and a local router switch for filtering packets so as to send only internet segment traffic from the local switches to the main router.
- traffic of the main router is reduced and the processing capability of the main router is limited to performance required for internet connection, thus the load for the main router is lightened as compared with management of the intranet routing table by the main router as in the conventional system.
- the local switches and the local router switch perform intranet routing processing, enabling high-speed routing.
- system costs are drastically decreased and intranet routing performance.can be enhanced.
- the main router can manage network subnets, a gateway is set in the virtual group registration/routing tables contained in the local switches, and a packet entered in the gateway is encapsulated and forwarded to the main router, whereby the packet can be routed to a different local switch and can take part in a common virtual group from a segment in a different subnet, thus enabling taking part in any desired virtual segment from a different virtual segment.
- the switch-based network especially supports the virtual network customizing function, whereby bands are easily provided and transmission quality is easily guaranteed for improving performance as compared with handling at the application level of a database, etc., and the user can perform grouping in response to organizations/projects of an enterprise, etc., speedily and easily by customizing the user environment independently of specific application.
- the user can customize the network resources and the utilities in free layout in units of workgroups, single rooms, conference rooms, etc.
- a virtual LAN can be realized without changing already existing packets and already existing terminals can be built in a virtual group with no change for customizing the user environment.
- a virtual group in which medium access methods, protocols, and applications are mixed can be set, the virtual group configuration with a server compatible with different types of terminals and protocols as the nucleus is supported, and a user environment with various types of network service integrated can be customized.
- Virtual groups are also automatically configured dynamically for a terminal move and moreover the agents of the switches can also coordinate with each other in an environment in which a large number of switches are distributed for automatically correcting the virtual group configuration containing the user environment and the optimum routing path.
- QOS user environment can also be customized by priority processing in virtual group units of applications, projects, etc.
- a user environment system at the standpoint of the user can be provided by virtual network service integrating and making good use of information resources of systems of network computing, system management, building management, facility management, etc.
- An information environment for enabling the user to customize a comfortable environment in free layout in response to change in organization units of single rooms, workgroups, etc., integrating other systems of BA, etc., can be provided as virtual network service.
- an intelligent building system for executing communication and control used by a resident such as an office, a plant, a hospital, or a building is divided into a plurality of residential units of the building, network service resources are distributed to the residential units so that service for the resident can be provided autonomously under local conditions meeting local requirements, functions and resources of local network service are integrated into a local node of each residential unit so that a plurality of local nodes autonomously provide network service, and common resources and common network service functions required for use of common building facilities, common service, and centralized management of the entire system are integrated into a center node.
- a plurality of local nodes can autonomously provide residential environment service containing environment measurement, monitor, and control using building facilities and information communication and the residential environment resources for residents containing air conditioning, security, and network are integrated into the local node by local network service, whereby residential environment service can be provided autonomously under local conditions meeting the local requirements.
- the resources such as shared building facilities concerning the entire residential environment common to the residents such as maintenance and management of the entire system, efficiency improvement of facility use, and global information communication and the functions and resources of common network service are collected in the center node and use of the common building facilities of the entire system, common service and centralized management resources are integrated into the center node by the common network service.
- residential environment service can be provided autonomously under common conditions meeting the common requirements.
- the resources are divided so that local resources and common resources are independent and that no conflict occurs in service.
- the local portion takes in whole control preferentially and suppresses local resource consumption and the local requirements can be most satisfied while the whole conditions are satisfied from among programs, for example, under fuzzy control, by a neuron network, etc.
- information communication service functions and resources and building facility service functions and resources required for local network service for a resident are distributed to residential units so that network service for the resident in an information communication network environment in a building such as an office, a plant, or a hospital can be provided autonomously under local conditions meeting local requirements
- network service functions of local information communication service like a virtual network configuration setting a multicast group such as an electronic conference using multimedia or providing virtual common information space different from physical placement through a network and local building facility service like residential environment service such as air conditioning and lighting
- communication, control, and monitor functions for providing local information communication resources and building facility resources used as resources for providing the local network service and service for a local resident autonomously under local conditions are integrated into distributed network service equipment
- common information communication service such as access to an internet, WAN connection, and message communication throughout the entire building and common building facility service such as energy saving, building automation, and disaster and crime prevention are integrated into a common network service server, and common information communication facility resources and common building facility resources as common network service resources used
- Network service for the residents can be provided autonomously under local conditions meeting the local requirements.
- Common information communication service such as access to the internet, WAN connection, and message communication throughout the entire building and common building facility service such as energy saving, building automation, and disaster and crime prevention are integrated into the common network service server and common network service can be provided.
- a scalable IT infrastructure can be constructed at low costs.
- floor space is divided and a comfortable environment optimum for the user integrating a virtual network and BA facility equipment can be autonomously localized for each local residential space and be customized in accordance with user requirements.
- building wiring may be made up of three layers of backbone wiring connecting a center node where the integrated network service equipment is installed and floor integrated wiring closets, floor trunk lines connecting the floor integrated wiring closets and equipment storage units placed in construction space, and floor branch lines connecting equipment storage units placed in building construction space such as space below a floor that can be accessed from shared space of the building and zone boxes or outlets and the local node where the distributed network service equipment is placed is the floor integrated wiring closet or the equipment storage unit placed in building construction space such as space below a floor that can be accessed from shared space of the building.
- the resources required for local network service can be collected in the local node. Effective use of space, batched design because of sharing with different facility piping, and reduction in construction costs are enabled and the effect on the building residents can be lessened when equipment is added or changed. Resultantly, the maintenance costs can be decreased.
- network service functions of local information communication service and building facility service are integrated into a local network service server, communication, control, and monitor functions for providing local information communication resources and building facility resources and service for a local resident autonomously under local conditions are integrated into distributed network service equipment, common information communication service and common building facility service are integrated into a common network service server, common information communication facility resources, common building facility resources, and communication, control, and monitor functions required for use of the entire system, common service, and centralized management are integrated into integrated network service equipment, local information communication service and local building facility service of building automation utilities, utilities of a different system, etc., common information communication service, common building facility service, and their linkage conditions can be set in a user environment or residential room unit setting area of the virtual group registration/routing table, and in automatic response to a user's network resource use request, a terminal move, addition, change, etc., the virtual group agents coordinate with each other and segment the information communication resources and building facility resources into
- a distributed integrated wiring system wherein in a configuration in which virtual network service agents, virtual group registration/routing tables, virtual network agents, user environment tables/residential room environment tables, and virtual user agents are placed in a network in a distributed manner, network service functions of local information communication service and building facility service are integrated into a local network service server, wherein communication, control, and monitor functions for providing local information communication resources and building facility resources and service for a local resident autonomously under local conditions are integrated into distributed network service equipment, wherein common information communication service and common building facility service are integrated into a common network service server, wherein common information communication facility resources, common building facility resources, and communication, control, and monitor functions required for use of the entire system, common service, and centralized management are integrated into integrated network service equipment, wherein local information communication service and local building facility service of building automation utilities, utilities of a different system, etc., common information communication service, common building facility service, and their linkage conditions can be set in a user environment or residential room unit setting area of the table, and where
Abstract
Description
______________________________________ Virtual network Change factor User environment Logical attribute ______________________________________ User request Residential unit Application Move User class Transport Addition Subnet Change Network Free layout ______________________________________ Physical attribute Facilities ______________________________________ Segment Building facilities Device Information communication Physical address facilities Port address ______________________________________ Virtual network service Function ______________________________________ Customization Virtual group Virtual agent Coordination problem solving ______________________________________ Quality Service ______________________________________ QoS Amenity Information communication Virtual space ______________________________________
Claims (26)
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP12775396A JP3520665B2 (en) | 1996-04-23 | 1996-04-23 | Virtual network method |
JP8-127753 | 1996-04-23 | ||
JP8-101649 | 1996-04-23 | ||
JP10164996A JP3124926B2 (en) | 1996-04-23 | 1996-04-23 | Virtual LAN method |
JP35737196A JP3533859B2 (en) | 1996-12-24 | 1996-12-24 | Distributed integrated wiring system |
JP8-357371 | 1996-12-24 | ||
JP35148096A JPH10190715A (en) | 1996-12-27 | 1996-12-27 | Network switching system |
JP8-351480 | 1996-12-27 | ||
JP01933397A JP3201731B2 (en) | 1997-01-31 | 1997-01-31 | Port segment switching method |
JP9-019333 | 1997-01-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
US6085238A true US6085238A (en) | 2000-07-04 |
Family
ID=27520126
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/844,791 Expired - Lifetime US6085238A (en) | 1996-04-23 | 1997-04-22 | Virtual LAN system |
Country Status (1)
Country | Link |
---|---|
US (1) | US6085238A (en) |
Cited By (503)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6173312B1 (en) * | 1996-07-09 | 2001-01-09 | Hitachi, Ltd. | System for reliably connecting a client computer to a server computer |
US6212559B1 (en) * | 1998-10-28 | 2001-04-03 | Trw Inc. | Automated configuration of internet-like computer networks |
US6249714B1 (en) * | 1998-12-31 | 2001-06-19 | Rensselaer Polytechnic Institute | Virtual design module |
US6253242B1 (en) * | 1998-08-07 | 2001-06-26 | Lucent Technologies Inc. | Group sampling method for connectionless networks |
US6266705B1 (en) * | 1998-09-29 | 2001-07-24 | Cisco Systems, Inc. | Look up mechanism and associated hash table for a network switch |
US20010020250A1 (en) * | 1995-05-25 | 2001-09-06 | Campbell R. David L. | Method and apparatus for automatically disseminating information over a network |
US20010032232A1 (en) * | 2000-01-31 | 2001-10-18 | Zombek James M. | Messaging method and apparatus including a protocol stack that corresponds substantially to an open system interconnection (OSI) model and incorporates a simple network transport layer |
US6307860B1 (en) | 1998-04-03 | 2001-10-23 | Mmc Networks, Inc. | Systems and methods for data transformation and transfer in networks |
US20020001310A1 (en) * | 2000-06-29 | 2002-01-03 | Khanh Mai | Virtual multicasting |
US20020009078A1 (en) * | 2000-05-12 | 2002-01-24 | Tim Wilson | Server and method for providing specific network services |
US20020023170A1 (en) * | 2000-03-02 | 2002-02-21 | Seaman Michael J. | Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device |
US20020031142A1 (en) * | 2000-06-02 | 2002-03-14 | Feridun Metin | Switched ethernet networks |
US20020044526A1 (en) * | 1998-01-13 | 2002-04-18 | Rijhsinghani Anil G. | Network switch with panic mode |
US6393473B1 (en) * | 1998-12-18 | 2002-05-21 | Cisco Technology, Inc. | Representing and verifying network management policies using collective constraints |
US20020073257A1 (en) * | 2000-12-07 | 2002-06-13 | Ibm Corporation | Transferring foreign protocols across a system area network |
US20020078370A1 (en) * | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Controlled information flow between communities via a firewall |
US20020075877A1 (en) * | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Community separation control in a multi-community node |
US20020082936A1 (en) * | 2000-12-21 | 2002-06-27 | Nokia Corporation | Simulated speed-of-light delay for recreational benefit applications |
US20020080783A1 (en) * | 2000-10-31 | 2002-06-27 | Yamaha Corporation | Communication control apparatus and method |
US6418480B1 (en) * | 1998-01-13 | 2002-07-09 | Enterasys Networks, Inc. | Communication packet including a multicast address and a destination address different than an equivalent to the multicast address |
US20020091795A1 (en) * | 2001-01-05 | 2002-07-11 | Michael Yip | Method and system of aggregate multiple VLANs in a metropolitan area network |
US20020107955A1 (en) * | 2001-02-08 | 2002-08-08 | International Business Machines Corporation | Protocol data unit prioritization in a data processing network |
US20020107984A1 (en) * | 2001-02-08 | 2002-08-08 | International Business Machines Corporation | Combining network management information with application information on a computer network |
US20020107949A1 (en) * | 2001-02-08 | 2002-08-08 | International Business Machines Corporation | Polling for and transfer of protocol data units in a data processing network |
US20020112087A1 (en) * | 2000-12-21 | 2002-08-15 | Berg Mitchell T. | Method and system for establishing a data structure of a connection with a client |
US20020112085A1 (en) * | 2000-12-21 | 2002-08-15 | Berg Mitchell T. | Method and system for communicating an information packet through multiple networks |
US6438612B1 (en) * | 1998-09-11 | 2002-08-20 | Ssh Communications Security, Ltd. | Method and arrangement for secure tunneling of data between virtual routers |
US20020116475A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating a request packet in response to a state |
US6442615B1 (en) * | 1997-10-23 | 2002-08-27 | Telefonaktiebolaget Lm Ericsson (Publ) | System for traffic data evaluation of real network with dynamic routing utilizing virtual network modelling |
US20020120761A1 (en) * | 2000-12-21 | 2002-08-29 | Berg Mitchell T. | Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation |
US20020129133A1 (en) * | 2000-12-22 | 2002-09-12 | Olsen Gregory P. | Managing network traffic using hashing functions |
WO2002075497A2 (en) * | 2001-03-16 | 2002-09-26 | Kenetec, Inc. | Methods and apparatus for delivering multimedia communications services to multiple tenants in a building |
US20020146002A1 (en) * | 2001-04-10 | 2002-10-10 | Takayuki Sato | Network administration apparatus, network administrating program, network administrating method and computer network system |
US6466963B1 (en) * | 1998-04-13 | 2002-10-15 | Omron Corporation | Agent system with prioritized processing of mobile agents |
US6469987B1 (en) | 1998-01-13 | 2002-10-22 | Enterasys Networks, Inc. | Virtual local area network with trunk stations |
US20020156867A1 (en) * | 2001-04-19 | 2002-10-24 | Naoko Iwami | Virtual private volume method and system |
US20020159452A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for virtual addressing in a communications network |
US20020174208A1 (en) * | 2001-05-16 | 2002-11-21 | International Business Machines Corporation | Network communications management system and method |
US20020184222A1 (en) * | 2001-05-04 | 2002-12-05 | Kohut Eric J. | Chaining database records that represent a single customer or multiple customers living in a household |
US6496510B1 (en) * | 1997-11-14 | 2002-12-17 | Hitachi, Ltd. | Scalable cluster-type router device and configuring method thereof |
US6517587B2 (en) * | 1998-12-08 | 2003-02-11 | Yodlee.Com, Inc. | Networked architecture for enabling automated gathering of information from Web servers |
US6526052B1 (en) * | 1998-12-23 | 2003-02-25 | Enterasys Networks, Inc. | Virtual local area networks having rules of precedence |
US20030055961A1 (en) * | 2001-09-20 | 2003-03-20 | Minoru Torii | Network device management apparatus, management system, and management method, and network device |
US20030061379A1 (en) * | 2001-09-27 | 2003-03-27 | International Business Machines Corporation | End node partitioning using virtualization |
US20030069954A1 (en) * | 2001-10-05 | 2003-04-10 | Adc Telecommunications, Inc. | Subnet pooling |
US20030067914A1 (en) * | 2001-09-28 | 2003-04-10 | Seog-Hee Kim | Apparatus and method of providing network connection of data processing terminals |
US6549938B1 (en) * | 1998-12-10 | 2003-04-15 | Nokia Corporation | System and method for prioritizing multicast packets in a network service class utilizing a priority-based quality of service |
US20030074513A1 (en) * | 2001-07-10 | 2003-04-17 | Vladimir Grouzdev | Bus communication architecture, in particular for multicomputing systems |
US20030084156A1 (en) * | 2001-10-26 | 2003-05-01 | Hewlett-Packard Company | Method and framework for generating an optimized deployment of software applications in a distributed computing environment using layered model descriptions of services and servers |
US20030084157A1 (en) * | 2001-10-26 | 2003-05-01 | Hewlett Packard Company | Tailorable optimization using model descriptions of services and servers in a computing environment |
US6567850B1 (en) | 1998-10-28 | 2003-05-20 | Yodlee, Inc. | System and method for determining revenue from an intermediary derived from servicing data requests |
US20030101239A1 (en) * | 2001-11-27 | 2003-05-29 | Takeshi Ishizaki | Storage device with VLAN support |
US20030101253A1 (en) * | 2001-11-29 | 2003-05-29 | Takayuki Saito | Method and system for distributing data in a network |
US6578021B1 (en) * | 1998-12-29 | 2003-06-10 | International Business Machines Corporation | Method and system for classifying network devices in virtual LANs |
US6584106B1 (en) * | 1999-05-24 | 2003-06-24 | Advanced Micro Devices, Inc. | Backbone forwarding scheme for multiport network switch |
US20030120763A1 (en) * | 2001-12-20 | 2003-06-26 | Volpano Dennis Michael | Personal virtual bridged local area networks |
US20030117954A1 (en) * | 2001-12-20 | 2003-06-26 | Alcatel | Telecommunications system employing virtual service network architecture |
US6587455B1 (en) * | 1999-05-27 | 2003-07-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Automatic discovery of nodes associated with a virtual subnet |
US20030123460A1 (en) * | 2001-12-27 | 2003-07-03 | Mackiewich Blair T. | User priority mapping in bridged VLANS |
US20030133422A1 (en) * | 2002-01-11 | 2003-07-17 | Harry Bims | Mobility support via routing |
US20030140163A1 (en) * | 2002-01-22 | 2003-07-24 | Conexant Systems, Inc. | Low-processor-load aggregation |
US20030142668A1 (en) * | 2002-01-31 | 2003-07-31 | Mosaid Technologies, Inc. | Trunking in a matrix |
US20030145118A1 (en) * | 2002-01-25 | 2003-07-31 | Volpano Dennis Michael | Bridged cryptographic VLAN |
US6611870B1 (en) * | 1997-08-19 | 2003-08-26 | Kabushiki Kaisha Toshiba | Server device and communication connection scheme using network interface processors |
US20030161274A1 (en) * | 2002-02-26 | 2003-08-28 | Binder Douglas B. | Network switch discovery method and apparatus |
US20030177221A1 (en) * | 2002-03-18 | 2003-09-18 | Hamid Ould-Brahim | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 Virtual Private Networks |
US6625156B2 (en) * | 1998-06-29 | 2003-09-23 | Nortel Networks Limited | Method of implementing quality-of-service data communications over a short-cut path through a routed network |
US20030191832A1 (en) * | 1999-06-01 | 2003-10-09 | Ramakrishna Satyavolu | Method and apparatus for controlled establishment of a turnkey system providing a centralized data aggregation and summary capability to third party entities |
US20030200295A1 (en) * | 2002-04-19 | 2003-10-23 | Roberts David Gary | Network system having a virtual-service-module |
US20030198189A1 (en) * | 2002-04-19 | 2003-10-23 | Dave Roberts | Network system having an instructional sequence for performing packet processing and optimizing the packet processing |
US6639901B1 (en) * | 2000-01-24 | 2003-10-28 | 3Com Corporation | Apparatus for and method for supporting 802.1Q VLAN tagging with independent VLAN learning in LAN emulation networks |
US20030212776A1 (en) * | 2002-05-07 | 2003-11-13 | Roberts David Gary | Methods and systems for changing a topology of a network |
US20030217030A1 (en) * | 2002-05-14 | 2003-11-20 | Byrne Michael J. | Facilitating failover to a secondary file server in a highly available file system |
US20030223361A1 (en) * | 2002-06-04 | 2003-12-04 | Zahid Hussain | System and method for hierarchical metering in a virtual router based network switch |
US20030223418A1 (en) * | 2002-06-04 | 2003-12-04 | Sachin Desai | Network packet steering |
US6662221B1 (en) * | 1999-04-12 | 2003-12-09 | Lucent Technologies Inc. | Integrated network and service management with automated flow through configuration and provisioning of virtual private networks |
US6668280B1 (en) * | 1998-05-08 | 2003-12-23 | Fujitsu Limited | System configuration setting method and transmission apparatus |
US20030236822A1 (en) * | 2002-06-10 | 2003-12-25 | Sven Graupner | Generating automated mappings of service demands to server capacites in a distributed computer system |
US6674756B1 (en) * | 1999-02-23 | 2004-01-06 | Alcatel | Multi-service network switch with multiple virtual routers |
US6678273B1 (en) * | 2000-02-10 | 2004-01-13 | Semaphore Corporation | Managed private network system |
US6701358B1 (en) | 1999-04-02 | 2004-03-02 | Nortel Networks Limited | Bulk configuring a virtual private network |
US6701406B1 (en) | 2000-11-17 | 2004-03-02 | Advanced Micro Devices, Inc. | PCI and MII compatible home phoneline networking alliance (HPNA) interface device |
US20040045014A1 (en) * | 2002-08-29 | 2004-03-04 | Rakesh Radhakrishnan | Strategic technology architecture roadmap |
US6711163B1 (en) | 1999-03-05 | 2004-03-23 | Alcatel | Data communication system with distributed multicasting |
US6718387B1 (en) * | 1997-12-10 | 2004-04-06 | Sun Microsystems, Inc. | Reallocating address spaces of a plurality of servers using a load balancing policy and a multicast channel |
US20040073683A1 (en) * | 1998-12-31 | 2004-04-15 | Beck Paul R. | Method and apparatus for providing an integrated cluster alias address |
US20040078621A1 (en) * | 2002-08-29 | 2004-04-22 | Cosine Communications, Inc. | System and method for virtual router failover in a network routing system |
US20040081104A1 (en) * | 2002-10-29 | 2004-04-29 | Weimin Pan | Method and system for network switch configuration |
US20040090986A1 (en) * | 1997-07-24 | 2004-05-13 | Shinji Usuba | Concentrator for speech telephones and method of communication over LAN using same |
US20040095934A1 (en) * | 2002-11-18 | 2004-05-20 | Cosine Communications, Inc. | System and method for hardware accelerated packet multicast in a virtual routing system |
US20040105389A1 (en) * | 1998-12-21 | 2004-06-03 | Huang Baosheng D. | Method for hybrid network planning |
US6763326B1 (en) * | 1999-12-22 | 2004-07-13 | Worldcom, Inc. | System and method for staggering time points for deployment of rings in a fiber optic network simulation plan |
US6766482B1 (en) | 2001-10-31 | 2004-07-20 | Extreme Networks | Ethernet automatic protection switching |
US6765591B2 (en) | 1999-04-02 | 2004-07-20 | Nortel Networks Limited | Managing a virtual private network |
US6766371B1 (en) * | 1999-10-05 | 2004-07-20 | Veritas Operating Corporation | Virtual network environment |
US20040141617A1 (en) * | 2001-12-20 | 2004-07-22 | Volpano Dennis Michael | Public access point |
US20040158615A1 (en) * | 2003-02-12 | 2004-08-12 | Keller Matthew Craig | Priority web browsing |
US6781989B1 (en) | 2000-11-17 | 2004-08-24 | Advanced Micro Devices, Inc. | Method to support VLANs on a phoneline network |
US6789118B1 (en) | 1999-02-23 | 2004-09-07 | Alcatel | Multi-service network switch with policy based routing |
US6788681B1 (en) * | 1999-03-16 | 2004-09-07 | Nortel Networks Limited | Virtual private networks and methods for their operation |
US20040181608A1 (en) * | 2003-03-10 | 2004-09-16 | Cypher Robert E. | Computer system with multiple classes of device IDs |
US20040202185A1 (en) * | 2003-04-14 | 2004-10-14 | International Business Machines Corporation | Multiple virtual local area network support for shared network adapters |
US20040210629A1 (en) * | 1998-12-30 | 2004-10-21 | Klindt Charles J. | Interface to a programmable logic controller |
US20040210623A1 (en) * | 2003-03-06 | 2004-10-21 | Aamer Hydrie | Virtual network topology generation |
US6826613B1 (en) * | 2000-03-15 | 2004-11-30 | 3Com Corporation | Virtually addressing storage devices through a switch |
US20040249916A1 (en) * | 2003-05-22 | 2004-12-09 | Graves David Andrew | Verifying the configuration of a virtual network |
US20050022183A1 (en) * | 1999-04-02 | 2005-01-27 | Poisson Matthew W. | Virtual private network manager GUI with links for use in configuring a virtual private network |
US20050021761A1 (en) * | 2000-06-29 | 2005-01-27 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an internet telephony system |
US20050025071A1 (en) * | 1998-05-29 | 2005-02-03 | Shigeru Miyake | Network management system having a network including virtual networks |
US6853645B1 (en) | 2000-11-17 | 2005-02-08 | Advanced Micro Devices, Inc. | PCI and MII compatible home phoneline networking alliance (HPNA) interface device |
US20050044199A1 (en) * | 2003-08-06 | 2005-02-24 | Kenta Shiga | Storage network management system and method |
US20050047098A1 (en) * | 2003-08-29 | 2005-03-03 | Sun Microsystems, Inc. | Aggregation switch |
US6865596B1 (en) * | 1999-06-09 | 2005-03-08 | Amx Corporation | Method and system for operating virtual devices by master controllers in a control system |
US20050068948A1 (en) * | 2003-09-15 | 2005-03-31 | Sanjay Bhardwaj | Generating an encapsulating header based on encapsulated information provided at protocol-dependent locations |
US20050089034A1 (en) * | 2003-08-07 | 2005-04-28 | Canon Kabushiki Kaisha | Network switching apparatus, route management server, network interface apparatus, control method therefor, computer program for route management server, and computer-readable storage medium |
US20050089029A1 (en) * | 2001-09-27 | 2005-04-28 | Heiko Ruhnke | Method for operating a transmission system and transmission system in an energy supply network |
US20050097147A1 (en) * | 2000-10-24 | 2005-05-05 | Microsoft Corporation | System and method for distributed management of shared computers |
US20050102388A1 (en) * | 2000-10-24 | 2005-05-12 | Microsoft Corporation | System and method for restricting data transfers and managing software components of distributed computers |
US6894999B1 (en) | 2000-11-17 | 2005-05-17 | Advanced Micro Devices, Inc. | Combining VLAN tagging with other network protocols allows a user to transfer data on a network with enhanced security |
US20050105508A1 (en) * | 2003-11-14 | 2005-05-19 | Innomedia Pte Ltd. | System for management of Internet telephony equipment deployed behind firewalls |
US20050111455A1 (en) * | 2003-11-20 | 2005-05-26 | Daiki Nozue | VLAN server |
US20050138171A1 (en) * | 2003-12-19 | 2005-06-23 | Slaight Thomas M. | Logical network traffic filtering |
US6912199B1 (en) | 2000-12-28 | 2005-06-28 | Advanced Micro Devices, Inc. | Method to select transmission rate for network device |
US20050141444A1 (en) * | 2003-12-19 | 2005-06-30 | Fujitsu Limited | Communication device management program |
US20050144276A1 (en) * | 2003-12-04 | 2005-06-30 | Bird Paul M. | Method, system and mechanism to multiplex multiple application server requests over a single database connection |
US6914905B1 (en) | 2000-06-16 | 2005-07-05 | Extreme Networks, Inc. | Method and system for VLAN aggregation |
US20050163132A1 (en) * | 2002-10-30 | 2005-07-28 | Hironori Mieno | L2 switch |
US6934261B1 (en) | 2000-11-17 | 2005-08-23 | Advanced Micro Devices, Inc. | Method to select dynamically between MACs of network device depending on network topology |
US6937574B1 (en) * | 1999-03-16 | 2005-08-30 | Nortel Networks Limited | Virtual private networks and methods for their operation |
US20050190752A1 (en) * | 2004-02-27 | 2005-09-01 | Cheng-Mau Chiou | Method and system for locating the incoming port of a MAC address in an Ethernet switch network |
US20050190788A1 (en) * | 2004-02-27 | 2005-09-01 | Wong Yu-Man M. | System and method for VLAN multiplexing |
US20050190773A1 (en) * | 2002-10-25 | 2005-09-01 | Huawei Technologies Co., Ltd. | Sub-rate transmission method for user data services in transmission devices of a metropolitan area network |
US6941350B1 (en) | 2000-10-19 | 2005-09-06 | International Business Machines Corporation | Method and apparatus for reliably choosing a master network manager during initialization of a network computing system |
US20050198251A1 (en) * | 2002-12-10 | 2005-09-08 | Junichi Toda | Network management system |
US20050201364A1 (en) * | 2004-03-11 | 2005-09-15 | Transnexus, Inc. | Method and system for routing calls over a packet switched computer network |
US6947438B1 (en) | 2000-11-17 | 2005-09-20 | Advanced Micro Devices, Inc. | PCI and MII compatible home phoneline networking alliance (HPNA) interface device |
US20050220109A1 (en) * | 2004-03-31 | 2005-10-06 | Fujitsu Limited | Routing table synchronization method, network apparatus, and routing table synchronization program |
US20050246450A1 (en) * | 2004-04-28 | 2005-11-03 | Yutaka Enko | Network protocol processing device |
US20050243826A1 (en) * | 2004-04-28 | 2005-11-03 | Smith Michael R | Intelligent adjunct network device |
US20050249125A1 (en) * | 2002-12-13 | 2005-11-10 | Yoon Seung H | Traffic measurement system and traffic analysis method thereof |
US20050256935A1 (en) * | 2004-05-06 | 2005-11-17 | Overstreet Matthew L | System and method for managing a network |
US20050267986A1 (en) * | 2004-05-11 | 2005-12-01 | Hitachi, Ltd. | Virtualization switch and storage system |
US6973499B1 (en) * | 2000-04-07 | 2005-12-06 | Intertrust Technologies Corp. | Ticketing and keying for orchestrating distribution of network content |
US6975581B1 (en) * | 1998-07-08 | 2005-12-13 | Marvell Semiconductor Israel Ltd. | VLAN protocol |
US6978300B1 (en) * | 2000-10-19 | 2005-12-20 | International Business Machines Corporation | Method and apparatus to perform fabric management |
US6981025B1 (en) | 2000-10-19 | 2005-12-27 | International Business Machines Corporation | Method and apparatus for ensuring scalable mastership during initialization of a system area network |
US6980515B1 (en) | 1999-02-23 | 2005-12-27 | Alcatel | Multi-service network switch with quality of access |
US20060005204A1 (en) * | 2004-07-02 | 2006-01-05 | Siegel Neil G | Dynamic software integration architecture |
US6990528B1 (en) | 2000-10-19 | 2006-01-24 | International Business Machines Corporation | System area network of end-to-end context via reliable datagram domains |
US20060031925A1 (en) * | 2004-08-05 | 2006-02-09 | Alcatel | Access control method and apparatus |
US7000014B2 (en) * | 1999-04-02 | 2006-02-14 | Nortel Networks Limited | Monitoring a virtual private network |
US20060036700A1 (en) * | 1997-12-17 | 2006-02-16 | Kazuhiko Hachiya | Method and apparatus for automatic sending of E-mail and automatic sending control program supplying medium |
US20060034272A1 (en) * | 2004-07-20 | 2006-02-16 | Naoko Kawakami | Network device |
US7006486B1 (en) * | 1999-06-23 | 2006-02-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Arrangement and a method in a switched telecommunication system |
US7020145B1 (en) * | 2001-09-24 | 2006-03-28 | Hewlett-Packard Development Company, L.P. | Network topology manager |
US20060067307A1 (en) * | 2001-01-11 | 2006-03-30 | Transnexus, Inc. | Architectures for clearing and settlement services between internet telephony clearinghouses |
US7023795B1 (en) | 2000-11-07 | 2006-04-04 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
US20060078127A1 (en) * | 2004-10-08 | 2006-04-13 | Philip Cacayorin | Dispersed data storage using cryptographic scrambling |
US7032029B1 (en) | 2000-07-07 | 2006-04-18 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
US20060083227A1 (en) * | 2004-10-18 | 2006-04-20 | Avigdor Eldar | Selecting one of a plurality of adapters to use to transmit a packet |
US7039705B2 (en) * | 2001-10-26 | 2006-05-02 | Hewlett-Packard Development Company, L.P. | Representing capacities and demands in a layered computing environment using normalized values |
US7047292B1 (en) * | 1999-05-24 | 2006-05-16 | Cisco Technology, Inc. | Prioritizing network management traffic |
US7058683B1 (en) * | 1999-07-20 | 2006-06-06 | Sun Microsystems, Inc. | Methods and apparatus for providing a virtual host in electronic messaging servers |
US20060149838A1 (en) * | 2000-10-24 | 2006-07-06 | Microsoft Corporation | System and Method for Logical Modeling of Distributed Computer Systems |
US20060155998A1 (en) * | 2000-09-11 | 2006-07-13 | Transnexus, Inc. | Clearinghouse server for internet telephony and multimedia communications |
US20060155708A1 (en) * | 2005-01-13 | 2006-07-13 | Microsoft Corporation | System and method for generating virtual networks |
US20060159114A1 (en) * | 2005-01-19 | 2006-07-20 | Mediacell Licensing Corp. | Dispersed High Level Devices in a Network Environment |
US20060165068A1 (en) * | 2004-12-13 | 2006-07-27 | Dalton James P Jr | Method and system for securely authorized VoIP Interconnections between anonymous peers of VoIP networks |
US20060167972A1 (en) * | 2000-01-31 | 2006-07-27 | Zombek James M | System and method for re-directing requests from browsers for communications over non-IP based networks |
US7085277B1 (en) * | 1997-10-03 | 2006-08-01 | Alcatel Canada Inc. | Service management of multiple independent forwarding realms |
US7085839B1 (en) | 2000-04-07 | 2006-08-01 | Intertrust Technologies Corporation | Network content management |
US7099285B1 (en) * | 2001-06-15 | 2006-08-29 | Advanced Micro Devices, Inc. | Remote configuration of a subnet configuration table in a network device |
US7099955B1 (en) | 2000-10-19 | 2006-08-29 | International Business Machines Corporation | End node partitioning using LMC for a system area network |
US20060212740A1 (en) * | 2005-03-16 | 2006-09-21 | Jackson David B | Virtual Private Cluster |
US7113995B1 (en) | 2000-10-19 | 2006-09-26 | International Business Machines Corporation | Method and apparatus for reporting unauthorized attempts to access nodes in a network computing system |
US20060248196A1 (en) * | 2005-04-27 | 2006-11-02 | International Business Machines Corporation | Using broadcast domains to manage virtual local area networks |
US20060256769A1 (en) * | 2005-05-11 | 2006-11-16 | Samsung Electronics Co., Ltd. | Method and apparatus for keeping information in routing tables consistent throughout wireless network |
US20060265519A1 (en) * | 2001-06-28 | 2006-11-23 | Fortinet, Inc. | Identifying nodes in a ring network |
US7142563B1 (en) | 2001-02-20 | 2006-11-28 | At&T Corp. | Service interface for QoS-driven HPNA networks |
US7142510B1 (en) * | 1997-12-04 | 2006-11-28 | British Telecommunications Public Limited Company | Communications network |
US7149786B1 (en) * | 1998-10-06 | 2006-12-12 | Jetter Ag | Network for data transmission |
US7154861B1 (en) * | 2002-04-22 | 2006-12-26 | Extreme Networks | Method and system for a virtual local area network to span multiple loop free network topology domains |
US20060291387A1 (en) * | 2005-06-22 | 2006-12-28 | Yamaha Corporation | Communication device and communication method therefor |
US20070005720A1 (en) * | 2003-09-26 | 2007-01-04 | Ralf Neuhaus | Method for establishing a communication connection in a direct communication network |
WO2006029391A3 (en) * | 2004-09-09 | 2007-01-11 | Amx Corp | Method, system and computer program using standard interfaces for independent device controllers |
US20070016805A1 (en) * | 1999-03-26 | 2007-01-18 | Klein Dean A | Data security for digital data storage |
US20070015514A1 (en) * | 2005-07-14 | 2007-01-18 | Mediacell Licensing Corp | Virtual Cells for Wireless Networks |
US7177311B1 (en) | 2002-06-04 | 2007-02-13 | Fortinet, Inc. | System and method for routing traffic through a virtual router-based network switch |
US7180855B1 (en) * | 2001-04-19 | 2007-02-20 | At&T Corp. | Service interface for QoS-driven HPNA networks |
US20070061418A1 (en) * | 2000-12-21 | 2007-03-15 | Berg Mitchell T | Method and system for initiating execution of software in response to a state |
US7194767B1 (en) * | 2002-06-28 | 2007-03-20 | Sprint Communications Company L.P. | Screened subnet having a secured utility VLAN |
US20070064715A1 (en) * | 2002-07-25 | 2007-03-22 | Avaya, Inc. | Method and apparatus for the assessment and optimization of network traffic |
US7197555B1 (en) * | 2000-09-13 | 2007-03-27 | Canon Kabushiki Kaisha | Directory server tracking tool |
US7203956B2 (en) | 1999-12-22 | 2007-04-10 | Transnexus, Inc. | System and method for the secure enrollment of devices with a clearinghouse server for internet telephony and multimedia communications |
US7203168B1 (en) * | 2002-06-19 | 2007-04-10 | Bellsouth Intellectual Property Corp. | System and method for managing network elements in an ATM network |
US20070086360A1 (en) * | 2000-12-21 | 2007-04-19 | Berg Mitchell T | Method and system for communicating an information packet through multiple router devices |
US20070115979A1 (en) * | 2004-11-18 | 2007-05-24 | Fortinet, Inc. | Method and apparatus for managing subscriber profiles |
US20070124496A1 (en) * | 2005-11-30 | 2007-05-31 | Tellabs Oy | Method and equipment for making a routing decision dependent on a quality-of-service class |
US7243374B2 (en) | 2001-08-08 | 2007-07-10 | Microsoft Corporation | Rapid application security threat analysis |
US20070159980A1 (en) * | 2006-01-12 | 2007-07-12 | Yasuo Yamaguchi | Disaster prevention system |
US20070168547A1 (en) * | 2006-01-13 | 2007-07-19 | Fortinet, Inc. | Computerized system and method for handling network traffic |
US20070167171A1 (en) * | 2005-12-30 | 2007-07-19 | Mediacell Licensing Corp | Determining the Location of a Device Having Two Communications Connections |
US20070198702A1 (en) * | 2005-12-30 | 2007-08-23 | Mediacell Licensing Corp | Traffic Routing Based on Geophysical Location |
US7266681B1 (en) | 2000-04-07 | 2007-09-04 | Intertrust Technologies Corp. | Network communications security agent |
US20070213049A1 (en) * | 2006-03-07 | 2007-09-13 | Mediacell Licensing Corp | Service Subscription Using Geophysical Location |
US7275113B1 (en) * | 1999-05-27 | 2007-09-25 | 3 Com Corporation | Dynamic network address configuration system and method |
US20070230470A1 (en) * | 2006-03-28 | 2007-10-04 | Redeye Networks, Inc. | Virtual collapsed backbone network architecture |
US20070239391A1 (en) * | 2005-03-30 | 2007-10-11 | West James R | Method and system for simulating multiple cable modems |
US7287180B1 (en) * | 2003-03-20 | 2007-10-23 | Info Value Computing, Inc. | Hardware independent hierarchical cluster of heterogeneous media servers using a hierarchical command beat protocol to synchronize distributed parallel computing systems and employing a virtual dynamic network topology for distributed parallel computing system |
US20070250628A1 (en) * | 2004-11-26 | 2007-10-25 | Fujitsu Limited | Network/service control method |
US7299246B1 (en) * | 2004-01-16 | 2007-11-20 | Landesk Software Limited | Client initiated multicast domain discovery |
US20070271543A1 (en) * | 2006-05-16 | 2007-11-22 | Alpert Charles J | Buffer Insertion to Reduce Wirelength in VLSI Circuits |
US20070286108A1 (en) * | 2000-11-22 | 2007-12-13 | Robert Meier | System and method for grouping multiple vlans into a single 802.11 ip multicast domain |
US20070286233A1 (en) * | 1999-03-10 | 2007-12-13 | Nishan Systems, Inc. | Method and Apparatus for Transferring Data Between IP Network Devices and SCSI and Fibre Channel Devices Over an IP Network |
US20080013474A1 (en) * | 2006-07-14 | 2008-01-17 | Symbol Technologies, Inc. | Wireless switch network architecture implementing layer 3 mobility domains |
US20080031185A1 (en) * | 2002-01-11 | 2008-02-07 | Broadcom Corporation | Tracking multiple interface connections by mobile stations |
US7340535B1 (en) | 2002-06-04 | 2008-03-04 | Fortinet, Inc. | System and method for controlling routing in a virtual router system |
US20080059622A1 (en) * | 1999-04-29 | 2008-03-06 | Amx Llc | Internet control system communication protocol, method and computer program |
US7376125B1 (en) | 2002-06-04 | 2008-05-20 | Fortinet, Inc. | Service processing switch |
US20080117917A1 (en) * | 2004-11-18 | 2008-05-22 | Fortinet, Inc. | Method and apparatus for managing subscriber profiles |
US20080133719A1 (en) * | 2006-11-30 | 2008-06-05 | Ofer Amitai | System and method of changing a network designation in response to data received from a device |
US7386628B1 (en) | 2002-05-08 | 2008-06-10 | Nortel Networks Limited | Methods and systems for processing network data packets |
US7395320B2 (en) | 2000-10-24 | 2008-07-01 | Microsoft Corporation | Providing automatic policy enforcement in a multi-computer service application |
US20080159260A1 (en) * | 2006-12-15 | 2008-07-03 | Brocade Communications Systems, Inc. | Fibre channel over ethernet frame |
US20080159277A1 (en) * | 2006-12-15 | 2008-07-03 | Brocade Communications Systems, Inc. | Ethernet over fibre channel |
US20080168549A1 (en) * | 2007-01-07 | 2008-07-10 | Netdevices Inc. | Efficient Implementation of Security Applications in a Networked Environment |
US20080181243A1 (en) * | 2006-12-15 | 2008-07-31 | Brocade Communications Systems, Inc. | Ethernet forwarding in high performance fabrics |
US20080186877A1 (en) * | 2000-10-17 | 2008-08-07 | Baldonado Omar C | Method and apparatus for coordinating routing parameters via a back-channel communication medium |
US20080219254A1 (en) * | 2000-07-10 | 2008-09-11 | Alterwan, Inc. | Wide area network using internet with high quality of service |
US7444398B1 (en) | 2000-09-13 | 2008-10-28 | Fortinet, Inc. | System and method for delivering security services |
US20090028155A1 (en) * | 2003-07-29 | 2009-01-29 | At&T Intellectual Property I, L.P. | Broadband access for virtual private networks |
US20090049161A1 (en) * | 2006-03-29 | 2009-02-19 | Fujitsu Limited | Server management program in network system |
US20090067442A1 (en) * | 2001-05-01 | 2009-03-12 | Thomas Joseph Killian | Method and system for managing multiple networks over a set of ports |
US20090080419A1 (en) * | 2007-09-26 | 2009-03-26 | Kutch Patrick G | Providing consistent manageability interface to a management controller for local and remote connections |
US7515557B1 (en) | 2002-01-11 | 2009-04-07 | Broadcom Corporation | Reconfiguration of a communication system |
US20090097406A1 (en) * | 2003-08-05 | 2009-04-16 | Scalent Systems, Inc. | Method and apparatus for achieving dynamic capacity and high availability in multi-stage data networks using adaptive flow-based routing |
US20090132701A1 (en) * | 2007-11-20 | 2009-05-21 | Robert Snively | Duplicate address discovery and action |
US7539185B2 (en) * | 2002-10-07 | 2009-05-26 | Broadcom Corporation | Fast-path implementation for an uplink double tagging engine |
US7539744B2 (en) | 2000-09-13 | 2009-05-26 | Fortinet, Inc. | Network operating system for maintaining redundant master control blade management information |
US20090138580A1 (en) * | 2004-08-31 | 2009-05-28 | Yoshifumi Takamoto | Method of booting an operating system |
EP2066081A1 (en) * | 2007-11-30 | 2009-06-03 | Ciena Corporation | Flow control using referential tables in a carrier ethernet network |
US20090172156A1 (en) * | 2007-12-29 | 2009-07-02 | Cisco Technology, Inc. | Address security in a routed access network |
US7568107B1 (en) | 2003-08-20 | 2009-07-28 | Extreme Networks, Inc. | Method and system for auto discovery of authenticator for network login |
US7567504B2 (en) | 2003-06-30 | 2009-07-28 | Microsoft Corporation | Network load balancing with traffic routing |
US20090190588A1 (en) * | 2007-03-08 | 2009-07-30 | Infineon Technologies Ag | Data Packet Switching |
US7583665B1 (en) * | 1997-10-03 | 2009-09-01 | Alcatel-Lucent Canada, Inc. | Method and apparatus for forwarding packets |
US7590736B2 (en) | 2003-06-30 | 2009-09-15 | Microsoft Corporation | Flexible network load balancing |
US20090248389A1 (en) * | 2008-03-31 | 2009-10-01 | Sony Corporation | Electronic device for emulating other electronic devices and method for operating an electronic device |
US7606929B2 (en) | 2003-06-30 | 2009-10-20 | Microsoft Corporation | Network load balancing with connection manipulation |
US7609689B1 (en) * | 2001-09-27 | 2009-10-27 | Cisco Technology, Inc. | System and method for mapping an index into an IPv6 address |
US20090268737A1 (en) * | 2008-04-24 | 2009-10-29 | James Ryan Giles | Method and Apparatus for VLAN-Based Selective Path Routing |
US7613822B2 (en) | 2003-06-30 | 2009-11-03 | Microsoft Corporation | Network load balancing with session information |
US20090292813A1 (en) * | 2007-12-17 | 2009-11-26 | Brocade Communications Systems, Inc. | Address Assignment in Fibre Channel Over Ethernet Environments |
US20090296726A1 (en) * | 2008-06-03 | 2009-12-03 | Brocade Communications Systems, Inc. | ACCESS CONTROL LIST MANAGEMENT IN AN FCoE ENVIRONMENT |
US7630877B2 (en) | 2003-03-06 | 2009-12-08 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US20090310535A1 (en) * | 2008-06-13 | 2009-12-17 | Nortel Networks Limited | Unifying Virtualizations in a Core Network and a Wireless Access Network |
US7636772B1 (en) | 2000-10-19 | 2009-12-22 | International Business Machines Corporation | Method and apparatus for dynamic retention of system area network management information in non-volatile store |
US7636917B2 (en) | 2003-06-30 | 2009-12-22 | Microsoft Corporation | Network load balancing with host status information |
US20090319652A1 (en) * | 2008-06-24 | 2009-12-24 | Lsi Corporation | Method, apparatus and system for serial attached scsi (sas) domain management |
US20090319646A1 (en) * | 2005-02-26 | 2009-12-24 | Tucker Mark L | Naming system layer |
US7643460B2 (en) | 2002-06-05 | 2010-01-05 | Broadcom Corporation | Distributed MAC architecture for a wireless repeater |
US20100005287A1 (en) * | 2001-03-27 | 2010-01-07 | Micron Technology, Inc. | Data security for digital data storage |
US7657615B1 (en) * | 2002-12-08 | 2010-02-02 | Sun Microsystems, Inc. | Approach for provisioning network devices |
US7669235B2 (en) | 2004-04-30 | 2010-02-23 | Microsoft Corporation | Secure domain join for computing devices |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US7684964B2 (en) | 2003-03-06 | 2010-03-23 | Microsoft Corporation | Model and system state synchronization |
US20100073252A1 (en) * | 2005-05-04 | 2010-03-25 | Sandwave Ip, Llc | Enclosure with Ground Plane |
US7689210B1 (en) | 2002-01-11 | 2010-03-30 | Broadcom Corporation | Plug-n-playable wireless communication system |
US7689676B2 (en) | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US7698454B1 (en) | 2001-11-26 | 2010-04-13 | Juniper Networks, Inc. | Interfacing with streams of differing speeds |
US7706364B2 (en) | 2004-05-19 | 2010-04-27 | Cisco Technology, Inc. | Virtual network device clusters |
US7710957B2 (en) | 2004-05-19 | 2010-05-04 | Cisco Technology, Inc. | System and method for implementing multiple spanning trees per network |
US7720959B2 (en) | 2000-10-17 | 2010-05-18 | Avaya Inc. | Method and apparatus for characterizing the quality of a network path |
US7720940B1 (en) * | 2007-09-28 | 2010-05-18 | World Wide Packets, Inc. | Managing a network element using a template configuration |
US20100145760A1 (en) * | 2008-12-10 | 2010-06-10 | William Cambre | Methods and apparatus to process network access service orders |
US7751416B2 (en) | 2003-09-18 | 2010-07-06 | Cisco Technology, Inc. | Virtual network device |
US7752535B2 (en) | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US20100180322A1 (en) * | 2005-09-20 | 2010-07-15 | Cisco Technology, Inc. | System and method for floating port configuration |
US20100177787A1 (en) * | 2009-01-12 | 2010-07-15 | Trane International Inc. | System and Method for Extending Communication Protocols |
US7778422B2 (en) | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
US20100214950A1 (en) * | 2009-02-23 | 2010-08-26 | Brocade Communications Systems, Inc. | High availability and multipathing for fibre channel over ethernet |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US20100235873A1 (en) * | 2009-03-13 | 2010-09-16 | Kiyotaka Tsuji | Video server apparatus |
US7802144B2 (en) | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US20100246388A1 (en) * | 2009-03-26 | 2010-09-30 | Brocade Communications Systems, Inc. | Redundant host connection in a routed network |
US7808983B2 (en) | 2004-07-08 | 2010-10-05 | Cisco Technology, Inc. | Network device architecture for centralized packet processing |
US7840704B2 (en) | 2000-10-17 | 2010-11-23 | Avaya Inc. | Method and apparatus for performance and cost optimization in an internetwork |
US7844835B2 (en) | 1995-02-13 | 2010-11-30 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7856386B2 (en) | 2006-09-07 | 2010-12-21 | Yodlee, Inc. | Host exchange in bill paying services |
CH701294A1 (en) * | 2009-06-18 | 2010-12-31 | Archimede Solutions Sarl | multi-protocol system monitoring and management of heterogeneous smart objects. |
US20110004675A1 (en) * | 2008-03-31 | 2011-01-06 | Fujitsu Limited | Virtual integrated management device for performing information update process for device configuration information management device |
US7876704B1 (en) * | 2002-01-11 | 2011-01-25 | Broadcom Corporation | Tunneling protocols for wireless communications |
US7886041B2 (en) | 2003-03-06 | 2011-02-08 | Microsoft Corporation | Design time validation of systems |
US20110032942A1 (en) * | 2000-09-13 | 2011-02-10 | Fortinet, Inc. | Fast path complex flow processing |
US20110053623A1 (en) * | 2009-09-03 | 2011-03-03 | Cisco Technology, Inc. | Hfc banding for a virtual service group |
US20110067107A1 (en) * | 2009-09-17 | 2011-03-17 | Sun Microsystems, Inc. | Integrated intrusion deflection, detection and introspection |
US7917749B2 (en) | 1995-02-13 | 2011-03-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7925898B2 (en) | 1996-08-12 | 2011-04-12 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US7941309B2 (en) | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US20110153730A1 (en) * | 2009-12-18 | 2011-06-23 | International Business Machines Corporation | Handling of data transfer in a lan-free environment |
US20110219086A1 (en) * | 2006-03-01 | 2011-09-08 | Fortinet, Inc. | Electronic message and data tracking system |
US8027637B1 (en) | 2002-01-11 | 2011-09-27 | Broadcom Corporation | Single frequency wireless communication system |
US8054780B1 (en) * | 2008-12-09 | 2011-11-08 | Sprint Spectrum L.P. | Transparent application data notification during IMS registrations |
US8059652B2 (en) | 2004-06-30 | 2011-11-15 | Cisco Technology, Inc. | Method and apparatus for detecting support for a protocol defining supplemental headers |
US20110289193A1 (en) * | 2010-05-20 | 2011-11-24 | Jae Hoon Kim | Method of controlling mobile terminal, home hub, and visited hub in virtual group for content sharing |
US20110286357A1 (en) * | 2010-05-18 | 2011-11-24 | Brocade Communications Systems, Inc. | Fabric formation for virtual cluster switching |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US20110299534A1 (en) * | 2010-06-08 | 2011-12-08 | Brocade Communications Systems, Inc. | Virtual port grouping for virtual cluster switching |
US8090856B1 (en) * | 2000-01-31 | 2012-01-03 | Telecommunication Systems, Inc. | Intelligent messaging network server interconnection |
US8117289B1 (en) | 2009-12-07 | 2012-02-14 | Amazon Technologies, Inc. | Using virtual networking devices to manage substrate devices |
US8125991B1 (en) * | 2007-07-31 | 2012-02-28 | Hewlett-Packard Development Company, L.P. | Network switch using managed addresses for fast route lookup |
US8131852B1 (en) | 2009-12-28 | 2012-03-06 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US8144640B2 (en) | 2002-01-11 | 2012-03-27 | Broadcom Corporation | Location tracking in a wireless communication system using power levels of packets received by repeaters |
US8185473B2 (en) | 1995-02-13 | 2012-05-22 | Intertrust Technologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US8190629B2 (en) | 1998-12-08 | 2012-05-29 | Yodlee.Com, Inc. | Network-based bookmark management and web-summary system |
US8224971B1 (en) | 2009-12-28 | 2012-07-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US8238329B2 (en) | 2005-12-13 | 2012-08-07 | Transnexus, Inc. | Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks |
US8250357B2 (en) | 2000-09-13 | 2012-08-21 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
US8260918B2 (en) | 2000-09-13 | 2012-09-04 | Fortinet, Inc. | Packet routing system and method |
US20120227041A1 (en) * | 2008-05-23 | 2012-09-06 | Vmware, Inc. | Management of distributed virtual switch and distributed virtual ports |
US20120230342A1 (en) * | 2011-03-07 | 2012-09-13 | Broadcom Corporation | Method and apparatus for routing in a single tier switched network |
US8271672B1 (en) * | 2001-08-31 | 2012-09-18 | Juniper Networks, Inc. | Guaranteed bandwidth memory apparatus and method |
US20120278652A1 (en) * | 2011-04-26 | 2012-11-01 | Dell Products, Lp | System and Method for Providing Failover Between Controllers in a Storage Array |
US8307212B2 (en) | 1996-08-12 | 2012-11-06 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US8312129B1 (en) | 2009-12-28 | 2012-11-13 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US8335841B2 (en) | 2010-09-30 | 2012-12-18 | Microsoft Corporation | Logical networks |
US20130031235A1 (en) * | 2010-09-20 | 2013-01-31 | Huawei Technologies Co., Ltd. | Method, network management center, and a related device for configuring a network policy for a virtual port |
US20130041976A1 (en) * | 2011-08-12 | 2013-02-14 | Microsoft Corporation | Context-aware delivery of content |
US8446914B2 (en) | 2010-06-08 | 2013-05-21 | Brocade Communications Systems, Inc. | Method and system for link aggregation across multiple switches |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US8503463B2 (en) | 2003-08-27 | 2013-08-06 | Fortinet, Inc. | Heterogeneous media packet bridging |
US20130212350A1 (en) * | 2012-02-15 | 2013-08-15 | Advanced Micro Devices, Inc. | Abstracting scratch pad memories as distributed arrays |
US20130218347A1 (en) * | 2012-02-22 | 2013-08-22 | Eunhwa JUNG | Building automation and control system and method for operating the same |
US8533851B2 (en) | 1996-08-30 | 2013-09-10 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
US8555359B2 (en) | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
US20130308492A1 (en) * | 2012-05-16 | 2013-11-21 | Vmware, Inc. | Configuration Management of Distributed Virtual Switch |
US8615556B1 (en) * | 2008-12-30 | 2013-12-24 | Symantec Corporation | Techniques for reducing broadcast messages |
US8625616B2 (en) | 2010-05-11 | 2014-01-07 | Brocade Communications Systems, Inc. | Converged network extension |
US20140010109A1 (en) * | 2012-02-27 | 2014-01-09 | Hitachi, Ltd. | Management server and management method |
US8630298B2 (en) | 2005-06-11 | 2014-01-14 | Sandwave Ip, Llc | Dispersed high level devices in a network environment |
US8634308B2 (en) | 2010-06-02 | 2014-01-21 | Brocade Communications Systems, Inc. | Path detection in trill networks |
US20140119239A1 (en) * | 2012-10-30 | 2014-05-01 | Ciena Corporation | Systems and methods for constrained forwarding based packet network connectivity |
US20140136677A1 (en) * | 2011-07-21 | 2014-05-15 | Huawei Technologies Co., Ltd. | Method and device of interface registration for a network device to join in a cluster system |
US8751793B2 (en) | 1995-02-13 | 2014-06-10 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US8751647B1 (en) * | 2001-06-30 | 2014-06-10 | Extreme Networks | Method and apparatus for network login authorization |
CN103873337A (en) * | 2012-12-12 | 2014-06-18 | 思科技术公司 | Flexible and scalable virtual network segment pruning method and device |
US20140177454A1 (en) * | 2012-12-21 | 2014-06-26 | Ixia | Methods, systems, and computer readable media for effecting movement of virtual switch interfaces between virtual switches connected to different physical ports of a device under test |
US8788651B1 (en) | 2007-09-28 | 2014-07-22 | Ciena Corporation | Multi-stage value retrieval and multi-rate value retrieval |
US20140222961A1 (en) * | 2011-09-12 | 2014-08-07 | Sharp Kabushiki Kaisha | Reproduction apparatus, reproduction method, distribution apparatus, distribution system, reproduction program, and storage medium |
US8826138B1 (en) * | 2008-10-29 | 2014-09-02 | Hewlett-Packard Development Company, L.P. | Virtual connect domain groups |
US8862996B1 (en) * | 2006-06-29 | 2014-10-14 | Emc Corporation | Method and apparatus for container mapping presentation of distributed systems |
US8867552B2 (en) | 2010-05-03 | 2014-10-21 | Brocade Communications Systems, Inc. | Virtual cluster switching |
US20140321445A1 (en) * | 2012-07-31 | 2014-10-30 | Aruba Networks, Inc. | Overlaying Virtual Broadcast Domains On An Underlying Physical Network |
US8880657B1 (en) * | 2011-06-28 | 2014-11-04 | Gogrid, LLC | System and method for configuring and managing virtual grids |
US8879549B2 (en) | 2011-06-28 | 2014-11-04 | Brocade Communications Systems, Inc. | Clearing forwarding entries dynamically and ensuring consistency of tables across ethernet fabric switch |
US8885641B2 (en) | 2011-06-30 | 2014-11-11 | Brocade Communication Systems, Inc. | Efficient trill forwarding |
US8885488B2 (en) | 2010-06-02 | 2014-11-11 | Brocade Communication Systems, Inc. | Reachability detection in trill networks |
US8914467B2 (en) | 2011-05-23 | 2014-12-16 | Fujitsu Limited | Information processing apparatus, system, and storage medium |
US20140371876A1 (en) * | 2013-06-18 | 2014-12-18 | NuLEDs, Inc. | Controlling loads and collecting building information via ip networks |
US20150033321A1 (en) * | 2012-02-15 | 2015-01-29 | Hangzhou H3C Technologies Co., Ltd. | Construct large-scale dvpn |
US8948056B2 (en) | 2011-06-28 | 2015-02-03 | Brocade Communication Systems, Inc. | Spanning-tree based loop detection for an ethernet fabric switch |
US8990430B2 (en) | 2004-02-19 | 2015-03-24 | Cisco Technology, Inc. | Interface bundles in virtual network devices |
US8995444B2 (en) | 2010-03-24 | 2015-03-31 | Brocade Communication Systems, Inc. | Method and system for extending routing domain to non-routing end stations |
US8995301B1 (en) * | 2009-12-07 | 2015-03-31 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US8995272B2 (en) | 2012-01-26 | 2015-03-31 | Brocade Communication Systems, Inc. | Link aggregation in software-defined networks |
US9007958B2 (en) | 2011-06-29 | 2015-04-14 | Brocade Communication Systems, Inc. | External loop detection for an ethernet fabric switch |
CN104579732A (en) * | 2013-10-21 | 2015-04-29 | 华为技术有限公司 | Method, device and system for managing virtualized network function network elements |
US20150116786A1 (en) * | 2013-10-28 | 2015-04-30 | Canon Kabushiki Kaisha | Image processing apparatus, method of controlling the same and storage medium |
US20150120003A1 (en) * | 2012-03-14 | 2015-04-30 | Mitsubishi Electric Corporation | Control device, air conditioning system, and equipment system |
US9036504B1 (en) | 2009-12-07 | 2015-05-19 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US9043792B1 (en) * | 2004-11-17 | 2015-05-26 | Vmware, Inc. | Virtual local area network (vlan) coordinator providing access to vlans |
US20150172106A1 (en) * | 2008-03-17 | 2015-06-18 | Microsoft Technology Licensing, Llc | Virtualization of groups of devices |
US9063739B2 (en) | 2005-09-07 | 2015-06-23 | Open Invention Network, Llc | Method and computer program for device configuration |
US9077559B2 (en) | 2010-06-03 | 2015-07-07 | Fujitsu Limited | Switching apparatus and method for setting up virtual LAN |
EP2482496A4 (en) * | 2009-09-24 | 2015-07-29 | Nec Corp | Identification system for inter-virtual-server communication and identification method for inter-virtual-server communication |
US9154416B2 (en) | 2012-03-22 | 2015-10-06 | Brocade Communications Systems, Inc. | Overlay tunnel in a fabric switch |
US9166805B1 (en) | 2004-09-24 | 2015-10-20 | Fortinet, Inc. | Scalable IP-services enabled multicast forwarding with efficient resource utilization |
US9203747B1 (en) | 2009-12-07 | 2015-12-01 | Amazon Technologies, Inc. | Providing virtual networking device functionality for managed computer networks |
US20150358239A1 (en) * | 2014-06-06 | 2015-12-10 | Verizon Patent And Licensing Inc. | Network policy and network device control |
US9225663B2 (en) | 2005-03-16 | 2015-12-29 | Adaptive Computing Enterprises, Inc. | System and method providing a virtual private cluster |
US9231890B2 (en) | 2010-06-08 | 2016-01-05 | Brocade Communications Systems, Inc. | Traffic management for virtual cluster switching |
US20160006646A1 (en) * | 2013-02-26 | 2016-01-07 | Hangzhou H3C Technologies Co., Ltd. | Multicasting a data message in a multi-site network |
US9246703B2 (en) | 2010-06-08 | 2016-01-26 | Brocade Communications Systems, Inc. | Remote port mirroring |
US20160028668A1 (en) * | 2001-03-26 | 2016-01-28 | Salesforce.Com, Inc. | Routing messages between applications |
US9270572B2 (en) | 2011-05-02 | 2016-02-23 | Brocade Communications Systems Inc. | Layer-3 support in TRILL networks |
US9270486B2 (en) | 2010-06-07 | 2016-02-23 | Brocade Communications Systems, Inc. | Name services for virtual cluster switching |
US20160127221A1 (en) * | 2014-10-31 | 2016-05-05 | Aruba Networks, Inc. | Igmp/mld leave upon client disassociation or user idle timer expiry |
US9350680B2 (en) | 2013-01-11 | 2016-05-24 | Brocade Communications Systems, Inc. | Protection switching over a virtual link aggregation |
US9374301B2 (en) | 2012-05-18 | 2016-06-21 | Brocade Communications Systems, Inc. | Network feedback in software-defined networks |
US9401872B2 (en) | 2012-11-16 | 2016-07-26 | Brocade Communications Systems, Inc. | Virtual link aggregations across multiple fabric switches |
US9401861B2 (en) | 2011-06-28 | 2016-07-26 | Brocade Communications Systems, Inc. | Scalable MAC address distribution in an Ethernet fabric switch |
US9401818B2 (en) | 2013-03-15 | 2016-07-26 | Brocade Communications Systems, Inc. | Scalable gateways for a fabric switch |
US9407533B2 (en) | 2011-06-28 | 2016-08-02 | Brocade Communications Systems, Inc. | Multicast in a trill network |
US9413691B2 (en) | 2013-01-11 | 2016-08-09 | Brocade Communications Systems, Inc. | MAC address synchronization in a fabric switch |
US20160248726A1 (en) * | 2015-02-23 | 2016-08-25 | Red Hat Israel, Ltd. | Scoped network address pool mangement |
US9450870B2 (en) | 2011-11-10 | 2016-09-20 | Brocade Communications Systems, Inc. | System and method for flow management in software-defined networks |
US9461840B2 (en) | 2010-06-02 | 2016-10-04 | Brocade Communications Systems, Inc. | Port profile management for virtual cluster switching |
US20160323113A1 (en) * | 2003-01-24 | 2016-11-03 | Coco Communications Corp. | Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration |
US9524173B2 (en) | 2014-10-09 | 2016-12-20 | Brocade Communications Systems, Inc. | Fast reboot for a switch |
US9544219B2 (en) | 2014-07-31 | 2017-01-10 | Brocade Communications Systems, Inc. | Global VLAN services |
US9548926B2 (en) | 2013-01-11 | 2017-01-17 | Brocade Communications Systems, Inc. | Multicast traffic load balancing over virtual link aggregation |
US9548873B2 (en) | 2014-02-10 | 2017-01-17 | Brocade Communications Systems, Inc. | Virtual extensible LAN tunnel keepalives |
US9565099B2 (en) | 2013-03-01 | 2017-02-07 | Brocade Communications Systems, Inc. | Spanning tree in fabric switches |
US9565028B2 (en) | 2013-06-10 | 2017-02-07 | Brocade Communications Systems, Inc. | Ingress switch multicast distribution in a fabric switch |
US9565113B2 (en) | 2013-01-15 | 2017-02-07 | Brocade Communications Systems, Inc. | Adaptive link aggregation and virtual link aggregation |
US9571337B1 (en) * | 2010-12-22 | 2017-02-14 | Juniper Networks, Inc. | Deriving control plane connectivity during provisioning of a distributed control plane of a switch |
US9602430B2 (en) | 2012-08-21 | 2017-03-21 | Brocade Communications Systems, Inc. | Global VLANs for fabric switches |
US9608833B2 (en) | 2010-06-08 | 2017-03-28 | Brocade Communications Systems, Inc. | Supporting multiple multicast trees in trill networks |
US9626255B2 (en) | 2014-12-31 | 2017-04-18 | Brocade Communications Systems, Inc. | Online restoration of a switch snapshot |
US9628407B2 (en) | 2014-12-31 | 2017-04-18 | Brocade Communications Systems, Inc. | Multiple software versions in a switch group |
US9628293B2 (en) | 2010-06-08 | 2017-04-18 | Brocade Communications Systems, Inc. | Network layer multicasting in trill networks |
US9674057B2 (en) | 2014-10-07 | 2017-06-06 | At&T Intellectual Property I, L.P. | Method and system to monitor a network |
US9699029B2 (en) | 2014-10-10 | 2017-07-04 | Brocade Communications Systems, Inc. | Distributed configuration management in a switch group |
US9699117B2 (en) | 2011-11-08 | 2017-07-04 | Brocade Communications Systems, Inc. | Integrated fibre channel support in an ethernet fabric switch |
US9699001B2 (en) | 2013-06-10 | 2017-07-04 | Brocade Communications Systems, Inc. | Scalable and segregated network virtualization |
US9716672B2 (en) | 2010-05-28 | 2017-07-25 | Brocade Communications Systems, Inc. | Distributed configuration management for virtual cluster switching |
US9736085B2 (en) | 2011-08-29 | 2017-08-15 | Brocade Communications Systems, Inc. | End-to end lossless Ethernet in Ethernet fabric |
US9742693B2 (en) | 2012-02-27 | 2017-08-22 | Brocade Communications Systems, Inc. | Dynamic service insertion in a fabric switch |
US9769016B2 (en) | 2010-06-07 | 2017-09-19 | Brocade Communications Systems, Inc. | Advanced link tracking for virtual cluster switching |
US9800471B2 (en) | 2014-05-13 | 2017-10-24 | Brocade Communications Systems, Inc. | Network extension groups of global VLANs in a fabric switch |
EP3116173A4 (en) * | 2014-03-04 | 2017-10-25 | Nec Corporation | Server, control device, management device, communication system, communication method, control method, management method, and program |
US9807007B2 (en) | 2014-08-11 | 2017-10-31 | Brocade Communications Systems, Inc. | Progressive MAC address learning |
US9806906B2 (en) | 2010-06-08 | 2017-10-31 | Brocade Communications Systems, Inc. | Flooding packets on a per-virtual-network basis |
US9807005B2 (en) | 2015-03-17 | 2017-10-31 | Brocade Communications Systems, Inc. | Multi-fabric manager |
US9806949B2 (en) | 2013-09-06 | 2017-10-31 | Brocade Communications Systems, Inc. | Transparent interconnection of Ethernet fabric switches |
US9807031B2 (en) | 2010-07-16 | 2017-10-31 | Brocade Communications Systems, Inc. | System and method for network configuration |
US9825822B1 (en) * | 2014-02-13 | 2017-11-21 | Amazon Technologies, Inc. | Group networking in an overlay network |
US9912614B2 (en) | 2015-12-07 | 2018-03-06 | Brocade Communications Systems LLC | Interconnection of switches based on hierarchical overlay tunneling |
US9912612B2 (en) | 2013-10-28 | 2018-03-06 | Brocade Communications Systems LLC | Extended ethernet fabric switches |
US9942097B2 (en) | 2015-01-05 | 2018-04-10 | Brocade Communications Systems LLC | Power management in a network of interconnected switches |
US9948644B2 (en) | 2001-03-26 | 2018-04-17 | Salesforce.Com, Inc. | Routing messages between applications |
US10003552B2 (en) | 2015-01-05 | 2018-06-19 | Brocade Communications Systems, Llc. | Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches |
US10038592B2 (en) | 2015-03-17 | 2018-07-31 | Brocade Communications Systems LLC | Identifier assignment to a new switch in a switch group |
US10063473B2 (en) | 2014-04-30 | 2018-08-28 | Brocade Communications Systems LLC | Method and system for facilitating switch virtualization in a network of interconnected switches |
US10171303B2 (en) | 2015-09-16 | 2019-01-01 | Avago Technologies International Sales Pte. Limited | IP-based interconnection of switches with a logical chassis |
US10237090B2 (en) | 2016-10-28 | 2019-03-19 | Avago Technologies International Sales Pte. Limited | Rule-based network identifier mapping |
US10241477B2 (en) * | 2016-11-02 | 2019-03-26 | Edison Labs, Inc. | Adaptive control methods for buildings with redundant circuitry |
US10277464B2 (en) | 2012-05-22 | 2019-04-30 | Arris Enterprises Llc | Client auto-configuration in a multi-switch link aggregation |
US10284485B2 (en) * | 2014-07-08 | 2019-05-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Communication nodes, methods therein, computer programs and a computer-readable storage medium |
US10375047B2 (en) * | 2013-09-30 | 2019-08-06 | Schneider Electric Industries Sas | Cloud-authenticated site resource management devices, apparatuses, methods and systems |
CN110221918A (en) * | 2015-01-19 | 2019-09-10 | 华为技术有限公司 | A kind of correlating method, the apparatus and system of NS and VNF |
US10439929B2 (en) | 2015-07-31 | 2019-10-08 | Avago Technologies International Sales Pte. Limited | Graceful recovery of a multicast-enabled switch |
US10447783B2 (en) * | 2012-11-28 | 2019-10-15 | Nomad Digital Limited | Communication method |
US10445146B2 (en) | 2006-03-16 | 2019-10-15 | Iii Holdings 12, Llc | System and method for managing a hybrid compute environment |
US10454760B2 (en) | 2012-05-23 | 2019-10-22 | Avago Technologies International Sales Pte. Limited | Layer-3 overlay gateways |
US10476698B2 (en) | 2014-03-20 | 2019-11-12 | Avago Technologies International Sales Pte. Limited | Redundent virtual link aggregation group |
US10581758B2 (en) | 2014-03-19 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Distributed hot standby links for vLAG |
US10579406B2 (en) | 2015-04-08 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Dynamic orchestration of overlay tunnels |
US10608949B2 (en) | 2005-03-16 | 2020-03-31 | Iii Holdings 12, Llc | Simple integration of an on-demand compute environment |
US10616108B2 (en) | 2014-07-29 | 2020-04-07 | Avago Technologies International Sales Pte. Limited | Scalable MAC address virtualization |
EP3605346A4 (en) * | 2017-03-30 | 2020-06-10 | Nec Corporation | Control device, control system, control method and program |
US10768958B2 (en) | 2004-11-17 | 2020-09-08 | Vmware, Inc. | Using virtual local area networks in a virtual computer system |
US20210314250A1 (en) * | 2019-06-11 | 2021-10-07 | Zscaler, Inc. | Auto re-segmentation to assign new applications in a microsegmented network |
US20220045938A1 (en) * | 2019-01-07 | 2022-02-10 | Nippon Telegraph And Telephone Corporation | Communication device, multicast transfer system, and multicast transfer method |
US20220217537A1 (en) * | 2007-06-12 | 2022-07-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11467883B2 (en) | 2004-03-13 | 2022-10-11 | Iii Holdings 12, Llc | Co-allocating a reservation spanning different compute resources types |
US11494235B2 (en) | 2004-11-08 | 2022-11-08 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11496415B2 (en) | 2005-04-07 | 2022-11-08 | Iii Holdings 12, Llc | On-demand access to compute resources |
CN115442302A (en) * | 2015-01-30 | 2022-12-06 | Nicira股份有限公司 | Logical router with multiple routing components |
US11522952B2 (en) | 2007-09-24 | 2022-12-06 | The Research Foundation For The State University Of New York | Automatic clustering for self-organizing grids |
US11526304B2 (en) | 2009-10-30 | 2022-12-13 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US11552930B2 (en) * | 2020-08-31 | 2023-01-10 | Equinix, Inc. | Virtual domains within a shared device |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11588787B2 (en) | 2004-03-16 | 2023-02-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11595364B2 (en) | 2005-03-16 | 2023-02-28 | Icontrol Networks, Inc. | System for data routing in networks |
US11601865B2 (en) | 2009-04-30 | 2023-03-07 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11616659B2 (en) | 2008-08-11 | 2023-03-28 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11625161B2 (en) | 2007-06-12 | 2023-04-11 | Icontrol Networks, Inc. | Control system user interface |
US11626006B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11625008B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Premises management networking |
US11630704B2 (en) | 2004-08-20 | 2023-04-18 | Iii Holdings 12, Llc | System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information |
US11632308B2 (en) | 2007-06-12 | 2023-04-18 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11641391B2 (en) | 2008-08-11 | 2023-05-02 | Icontrol Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11652706B2 (en) | 2004-06-18 | 2023-05-16 | Iii Holdings 12, Llc | System and method for providing dynamic provisioning within a compute environment |
US11656667B2 (en) | 2004-03-16 | 2023-05-23 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11663902B2 (en) | 2007-04-23 | 2023-05-30 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11720290B2 (en) | 2009-10-30 | 2023-08-08 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US11757834B2 (en) | 2004-03-16 | 2023-09-12 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11809174B2 (en) | 2007-02-28 | 2023-11-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11824675B2 (en) | 2005-03-16 | 2023-11-21 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11894986B2 (en) | 2007-06-12 | 2024-02-06 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11900790B2 (en) | 2010-09-28 | 2024-02-13 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11917044B2 (en) | 2009-09-30 | 2024-02-27 | Nicira, Inc. | Private allocated networks over shared communications infrastructure |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11943301B2 (en) | 2014-03-03 | 2024-03-26 | Icontrol Networks, Inc. | Media content management |
US11962672B2 (en) | 2023-05-12 | 2024-04-16 | Icontrol Networks, Inc. | Virtual device systems and methods |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4413338A (en) * | 1980-03-20 | 1983-11-01 | Roger Renoulin | Communication system for interconnecting a plurality of asynchronous data processing terminals |
US4897874A (en) * | 1988-03-31 | 1990-01-30 | American Telephone And Telegraph Company At&T Bell Laboratories | Metropolitan area network arrangement for serving virtual data networks |
US4922503A (en) * | 1988-10-28 | 1990-05-01 | Infotron Systems Corporation | Local area network bridge |
US5023780A (en) * | 1991-01-03 | 1991-06-11 | Northern Telecom Limited | Method of operating a packet switching network |
US5483647A (en) * | 1992-12-17 | 1996-01-09 | Bull Hn Information Systems Inc. | System for switching between two different operating systems by invoking the server to determine physical conditions to initiate a physical connection transparent to the user |
US5511168A (en) * | 1993-07-01 | 1996-04-23 | Digital Equipment Corporation | Virtual circuit manager for multicast messaging |
US5522045A (en) * | 1992-03-27 | 1996-05-28 | Panasonic Technologies, Inc. | Method for updating value in distributed shared virtual memory among interconnected computer nodes having page table with minimal processor involvement |
US5539884A (en) * | 1993-05-20 | 1996-07-23 | Bell Communications Research, Inc. | Intelligent broadband communication system and method employing fast-packet switches |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US5617421A (en) * | 1994-06-17 | 1997-04-01 | Cisco Systems, Inc. | Extended domain computer network using standard links |
US5684800A (en) * | 1995-11-15 | 1997-11-04 | Cabletron Systems, Inc. | Method for establishing restricted broadcast groups in a switched network |
US5751967A (en) * | 1994-07-25 | 1998-05-12 | Bay Networks Group, Inc. | Method and apparatus for automatically configuring a network device to support a virtual network |
US5752003A (en) * | 1995-07-14 | 1998-05-12 | 3 Com Corporation | Architecture for managing traffic in a virtual LAN environment |
US5764911A (en) * | 1996-02-13 | 1998-06-09 | Hitachi, Ltd. | Management system for updating network managed by physical manager to match changed relation between logical objects in conformity with changed content notified by logical manager |
-
1997
- 1997-04-22 US US08/844,791 patent/US6085238A/en not_active Expired - Lifetime
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4413338A (en) * | 1980-03-20 | 1983-11-01 | Roger Renoulin | Communication system for interconnecting a plurality of asynchronous data processing terminals |
US4897874A (en) * | 1988-03-31 | 1990-01-30 | American Telephone And Telegraph Company At&T Bell Laboratories | Metropolitan area network arrangement for serving virtual data networks |
US4922503A (en) * | 1988-10-28 | 1990-05-01 | Infotron Systems Corporation | Local area network bridge |
US5023780A (en) * | 1991-01-03 | 1991-06-11 | Northern Telecom Limited | Method of operating a packet switching network |
US5522045A (en) * | 1992-03-27 | 1996-05-28 | Panasonic Technologies, Inc. | Method for updating value in distributed shared virtual memory among interconnected computer nodes having page table with minimal processor involvement |
US5483647A (en) * | 1992-12-17 | 1996-01-09 | Bull Hn Information Systems Inc. | System for switching between two different operating systems by invoking the server to determine physical conditions to initiate a physical connection transparent to the user |
US5539884A (en) * | 1993-05-20 | 1996-07-23 | Bell Communications Research, Inc. | Intelligent broadband communication system and method employing fast-packet switches |
US5511168A (en) * | 1993-07-01 | 1996-04-23 | Digital Equipment Corporation | Virtual circuit manager for multicast messaging |
US5617421A (en) * | 1994-06-17 | 1997-04-01 | Cisco Systems, Inc. | Extended domain computer network using standard links |
US5751967A (en) * | 1994-07-25 | 1998-05-12 | Bay Networks Group, Inc. | Method and apparatus for automatically configuring a network device to support a virtual network |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
US5752003A (en) * | 1995-07-14 | 1998-05-12 | 3 Com Corporation | Architecture for managing traffic in a virtual LAN environment |
US5684800A (en) * | 1995-11-15 | 1997-11-04 | Cabletron Systems, Inc. | Method for establishing restricted broadcast groups in a switched network |
US5764911A (en) * | 1996-02-13 | 1998-06-09 | Hitachi, Ltd. | Management system for updating network managed by physical manager to match changed relation between logical objects in conformity with changed content notified by logical manager |
Cited By (965)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8185473B2 (en) | 1995-02-13 | 2012-05-22 | Intertrust Technologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US8543842B2 (en) | 1995-02-13 | 2013-09-24 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronics rights protection |
US7917749B2 (en) | 1995-02-13 | 2011-03-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7844835B2 (en) | 1995-02-13 | 2010-11-30 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US8751793B2 (en) | 1995-02-13 | 2014-06-10 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US20010054099A1 (en) * | 1995-05-25 | 2001-12-20 | Punch Networks Corporation | Method and apparatus for automatically disseminating information over a network |
US20010020250A1 (en) * | 1995-05-25 | 2001-09-06 | Campbell R. David L. | Method and apparatus for automatically disseminating information over a network |
US20050132035A1 (en) * | 1995-05-25 | 2005-06-16 | Punch Networks Corporation | Method and apparatus for automatically disseminating information over a network |
US20050132059A1 (en) * | 1995-05-25 | 2005-06-16 | Punch Networks Corporation | Method and apparatus for automatically disseminating information over a network |
US6173312B1 (en) * | 1996-07-09 | 2001-01-09 | Hitachi, Ltd. | System for reliably connecting a client computer to a server computer |
US8307212B2 (en) | 1996-08-12 | 2012-11-06 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US7925898B2 (en) | 1996-08-12 | 2011-04-12 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US8533851B2 (en) | 1996-08-30 | 2013-09-10 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US8379633B2 (en) | 1997-07-24 | 2013-02-19 | Oki Electric Industry Co., Ltd. | Concentrator for speech telephones and method of communication over LAN using same |
US20040090986A1 (en) * | 1997-07-24 | 2004-05-13 | Shinji Usuba | Concentrator for speech telephones and method of communication over LAN using same |
US7561538B2 (en) * | 1997-07-24 | 2009-07-14 | Oki Electronic Industry Co. Ltd. | Concentrator for speech telephones and method of communication over LAN using same |
US20030208599A1 (en) * | 1997-08-19 | 2003-11-06 | Kabushiki Kaisha Toshiba | Server device and communication connection scheme using network interface processors |
US6611870B1 (en) * | 1997-08-19 | 2003-08-26 | Kabushiki Kaisha Toshiba | Server device and communication connection scheme using network interface processors |
US7583665B1 (en) * | 1997-10-03 | 2009-09-01 | Alcatel-Lucent Canada, Inc. | Method and apparatus for forwarding packets |
US7961727B2 (en) * | 1997-10-03 | 2011-06-14 | Alcatel-Lucent Canada Inc. | Method and apparatus for forwarding packets |
US20100014518A1 (en) * | 1997-10-03 | 2010-01-21 | Alcatel-Lucent Canada Inc. | Method and apparatus for forwarding packets |
US7085277B1 (en) * | 1997-10-03 | 2006-08-01 | Alcatel Canada Inc. | Service management of multiple independent forwarding realms |
US6442615B1 (en) * | 1997-10-23 | 2002-08-27 | Telefonaktiebolaget Lm Ericsson (Publ) | System for traffic data evaluation of real network with dynamic routing utilizing virtual network modelling |
US6496510B1 (en) * | 1997-11-14 | 2002-12-17 | Hitachi, Ltd. | Scalable cluster-type router device and configuring method thereof |
US7142510B1 (en) * | 1997-12-04 | 2006-11-28 | British Telecommunications Public Limited Company | Communications network |
US6718387B1 (en) * | 1997-12-10 | 2004-04-06 | Sun Microsystems, Inc. | Reallocating address spaces of a plurality of servers using a load balancing policy and a multicast channel |
US7376707B2 (en) * | 1997-12-17 | 2008-05-20 | Sony Corporation | Method and apparatus for automatic sending of E-mail and automatic sending control program supplying medium |
US20060036700A1 (en) * | 1997-12-17 | 2006-02-16 | Kazuhiko Hachiya | Method and apparatus for automatic sending of E-mail and automatic sending control program supplying medium |
US6418480B1 (en) * | 1998-01-13 | 2002-07-09 | Enterasys Networks, Inc. | Communication packet including a multicast address and a destination address different than an equivalent to the multicast address |
US20020044526A1 (en) * | 1998-01-13 | 2002-04-18 | Rijhsinghani Anil G. | Network switch with panic mode |
US6469987B1 (en) | 1998-01-13 | 2002-10-22 | Enterasys Networks, Inc. | Virtual local area network with trunk stations |
US6307860B1 (en) | 1998-04-03 | 2001-10-23 | Mmc Networks, Inc. | Systems and methods for data transformation and transfer in networks |
US6466963B1 (en) * | 1998-04-13 | 2002-10-15 | Omron Corporation | Agent system with prioritized processing of mobile agents |
US6668280B1 (en) * | 1998-05-08 | 2003-12-23 | Fujitsu Limited | System configuration setting method and transmission apparatus |
US20050025071A1 (en) * | 1998-05-29 | 2005-02-03 | Shigeru Miyake | Network management system having a network including virtual networks |
US6625156B2 (en) * | 1998-06-29 | 2003-09-23 | Nortel Networks Limited | Method of implementing quality-of-service data communications over a short-cut path through a routed network |
US20060039378A1 (en) * | 1998-07-08 | 2006-02-23 | Marvell Semiconductor Israel Ltd. | Vlan protocol |
US20090296717A1 (en) * | 1998-07-08 | 2009-12-03 | Eitan Medina | Vlan protocol |
US6975581B1 (en) * | 1998-07-08 | 2005-12-13 | Marvell Semiconductor Israel Ltd. | VLAN protocol |
US7957388B2 (en) | 1998-07-08 | 2011-06-07 | Marvell Israel (M.I.S.L) Ltd. | VLAN protocol |
US7573882B2 (en) | 1998-07-08 | 2009-08-11 | Marvell Israel (M.I.S.L) Ltd. | VLAN protocol |
US8416783B2 (en) | 1998-07-08 | 2013-04-09 | Marvell Israel (M.I.S.L.) Ltd. | VLAN protocol |
US20110222544A1 (en) * | 1998-07-08 | 2011-09-15 | Eitan Medina | VLAN Protocol |
US6253242B1 (en) * | 1998-08-07 | 2001-06-26 | Lucent Technologies Inc. | Group sampling method for connectionless networks |
US6438612B1 (en) * | 1998-09-11 | 2002-08-20 | Ssh Communications Security, Ltd. | Method and arrangement for secure tunneling of data between virtual routers |
US6457058B1 (en) | 1998-09-29 | 2002-09-24 | Cisco Technology, Inc. | Network switch with hash table look up |
US6266705B1 (en) * | 1998-09-29 | 2001-07-24 | Cisco Systems, Inc. | Look up mechanism and associated hash table for a network switch |
US7149786B1 (en) * | 1998-10-06 | 2006-12-12 | Jetter Ag | Network for data transmission |
US7765279B1 (en) | 1998-10-28 | 2010-07-27 | Verticalone Corporation | System and method for scheduling harvesting of personal information |
US6212559B1 (en) * | 1998-10-28 | 2001-04-03 | Trw Inc. | Automated configuration of internet-like computer networks |
US6567850B1 (en) | 1998-10-28 | 2003-05-20 | Yodlee, Inc. | System and method for determining revenue from an intermediary derived from servicing data requests |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US8190629B2 (en) | 1998-12-08 | 2012-05-29 | Yodlee.Com, Inc. | Network-based bookmark management and web-summary system |
US6517587B2 (en) * | 1998-12-08 | 2003-02-11 | Yodlee.Com, Inc. | Networked architecture for enabling automated gathering of information from Web servers |
US6549938B1 (en) * | 1998-12-10 | 2003-04-15 | Nokia Corporation | System and method for prioritizing multicast packets in a network service class utilizing a priority-based quality of service |
US6393473B1 (en) * | 1998-12-18 | 2002-05-21 | Cisco Technology, Inc. | Representing and verifying network management policies using collective constraints |
US20040105389A1 (en) * | 1998-12-21 | 2004-06-03 | Huang Baosheng D. | Method for hybrid network planning |
US7502315B2 (en) * | 1998-12-21 | 2009-03-10 | At&T Intellectual Property Ii, L.P. | Method for hybrid network planning |
US6526052B1 (en) * | 1998-12-23 | 2003-02-25 | Enterasys Networks, Inc. | Virtual local area networks having rules of precedence |
US6578021B1 (en) * | 1998-12-29 | 2003-06-10 | International Business Machines Corporation | Method and system for classifying network devices in virtual LANs |
US7062335B2 (en) | 1998-12-30 | 2006-06-13 | Schneider Automation Inc. | Interface to a programmable logic controller |
US6853867B1 (en) * | 1998-12-30 | 2005-02-08 | Schneider Automation Inc. | Interface to a programmable logic controller |
US20040210629A1 (en) * | 1998-12-30 | 2004-10-21 | Klindt Charles J. | Interface to a programmable logic controller |
US6249714B1 (en) * | 1998-12-31 | 2001-06-19 | Rensselaer Polytechnic Institute | Virtual design module |
US20040073683A1 (en) * | 1998-12-31 | 2004-04-15 | Beck Paul R. | Method and apparatus for providing an integrated cluster alias address |
US6980515B1 (en) | 1999-02-23 | 2005-12-27 | Alcatel | Multi-service network switch with quality of access |
US6674756B1 (en) * | 1999-02-23 | 2004-01-06 | Alcatel | Multi-service network switch with multiple virtual routers |
US6789118B1 (en) | 1999-02-23 | 2004-09-07 | Alcatel | Multi-service network switch with policy based routing |
US6711163B1 (en) | 1999-03-05 | 2004-03-23 | Alcatel | Data communication system with distributed multicasting |
US20070286233A1 (en) * | 1999-03-10 | 2007-12-13 | Nishan Systems, Inc. | Method and Apparatus for Transferring Data Between IP Network Devices and SCSI and Fibre Channel Devices Over an IP Network |
US6788681B1 (en) * | 1999-03-16 | 2004-09-07 | Nortel Networks Limited | Virtual private networks and methods for their operation |
US6937574B1 (en) * | 1999-03-16 | 2005-08-30 | Nortel Networks Limited | Virtual private networks and methods for their operation |
US9117095B2 (en) | 1999-03-26 | 2015-08-25 | Round Rock Research Llc | Data security for digital data storage |
US7979720B2 (en) * | 1999-03-26 | 2011-07-12 | Round Rock Research, Llc | Data security for digital data storage |
US20070016805A1 (en) * | 1999-03-26 | 2007-01-18 | Klein Dean A | Data security for digital data storage |
US8533491B2 (en) | 1999-03-26 | 2013-09-10 | Round Rock Research, Llc | Data security for digital data storage |
US20050022183A1 (en) * | 1999-04-02 | 2005-01-27 | Poisson Matthew W. | Virtual private network manager GUI with links for use in configuring a virtual private network |
US6765591B2 (en) | 1999-04-02 | 2004-07-20 | Nortel Networks Limited | Managing a virtual private network |
US20040199624A1 (en) * | 1999-04-02 | 2004-10-07 | Poisson Matthew W. | Managing a virtual private network |
US7831689B2 (en) | 1999-04-02 | 2010-11-09 | Nortel Networks Corporation | Virtual private network manager GUI with links for use in configuring a virtual private network |
US7000014B2 (en) * | 1999-04-02 | 2006-02-14 | Nortel Networks Limited | Monitoring a virtual private network |
US6701358B1 (en) | 1999-04-02 | 2004-03-02 | Nortel Networks Limited | Bulk configuring a virtual private network |
US6662221B1 (en) * | 1999-04-12 | 2003-12-09 | Lucent Technologies Inc. | Integrated network and service management with automated flow through configuration and provisioning of virtual private networks |
US20080059622A1 (en) * | 1999-04-29 | 2008-03-06 | Amx Llc | Internet control system communication protocol, method and computer program |
US8572224B2 (en) | 1999-04-29 | 2013-10-29 | Thomas D. Hite | Internet control system communication protocol, method and computer program |
US7673030B2 (en) | 1999-04-29 | 2010-03-02 | Amx Llc | Internet control system communication protocol, method and computer program |
US7047292B1 (en) * | 1999-05-24 | 2006-05-16 | Cisco Technology, Inc. | Prioritizing network management traffic |
US7519598B2 (en) | 1999-05-24 | 2009-04-14 | Cisco Technology, Inc. | Prioritizing network management traffic |
US6584106B1 (en) * | 1999-05-24 | 2003-06-24 | Advanced Micro Devices, Inc. | Backbone forwarding scheme for multiport network switch |
US20060161519A1 (en) * | 1999-05-24 | 2006-07-20 | Stewart Robert L | Prioritizing network management traffic |
US7275113B1 (en) * | 1999-05-27 | 2007-09-25 | 3 Com Corporation | Dynamic network address configuration system and method |
US6587455B1 (en) * | 1999-05-27 | 2003-07-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Automatic discovery of nodes associated with a virtual subnet |
US20030191832A1 (en) * | 1999-06-01 | 2003-10-09 | Ramakrishna Satyavolu | Method and apparatus for controlled establishment of a turnkey system providing a centralized data aggregation and summary capability to third party entities |
US7752535B2 (en) | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US6865596B1 (en) * | 1999-06-09 | 2005-03-08 | Amx Corporation | Method and system for operating virtual devices by master controllers in a control system |
US7006486B1 (en) * | 1999-06-23 | 2006-02-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Arrangement and a method in a switched telecommunication system |
US9614971B2 (en) | 1999-06-29 | 2017-04-04 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an internet telephony system |
US7058683B1 (en) * | 1999-07-20 | 2006-06-06 | Sun Microsystems, Inc. | Methods and apparatus for providing a virtual host in electronic messaging servers |
US20050021755A1 (en) * | 1999-10-05 | 2005-01-27 | Hipp Emily L. | Virtual network environment |
US7146431B2 (en) * | 1999-10-05 | 2006-12-05 | Veritas Operating Corporation | Virtual network environment |
US6766371B1 (en) * | 1999-10-05 | 2004-07-20 | Veritas Operating Corporation | Virtual network environment |
US20040162718A1 (en) * | 1999-12-22 | 2004-08-19 | Mciworldcom, Inc. | System and method for staggering time points for deployment of rings in a fiber optic network simulation plan |
US6763326B1 (en) * | 1999-12-22 | 2004-07-13 | Worldcom, Inc. | System and method for staggering time points for deployment of rings in a fiber optic network simulation plan |
US7398551B2 (en) | 1999-12-22 | 2008-07-08 | Transnexus, Inc. | System and method for the secure enrollment of devices with a clearinghouse server for internet telephony and multimedia communications |
US7318016B2 (en) | 1999-12-22 | 2008-01-08 | Verizon Business Global Llc | System and method for staggering time points for deployment of rings in a fiber optic network simulation plan |
US7203956B2 (en) | 1999-12-22 | 2007-04-10 | Transnexus, Inc. | System and method for the secure enrollment of devices with a clearinghouse server for internet telephony and multimedia communications |
US6639901B1 (en) * | 2000-01-24 | 2003-10-28 | 3Com Corporation | Apparatus for and method for supporting 802.1Q VLAN tagging with independent VLAN learning in LAN emulation networks |
US7895256B2 (en) | 2000-01-31 | 2011-02-22 | Telecommunication Systems, Inc. | Open system interconnection (OSI) messaging |
US20020052968A1 (en) * | 2000-01-31 | 2002-05-02 | Rudy Bonefas | Messaging method and apparatus for routing messages in a client server environment over multiple wireless and wireline networks |
US8090856B1 (en) * | 2000-01-31 | 2012-01-03 | Telecommunication Systems, Inc. | Intelligent messaging network server interconnection |
US20010032232A1 (en) * | 2000-01-31 | 2001-10-18 | Zombek James M. | Messaging method and apparatus including a protocol stack that corresponds substantially to an open system interconnection (OSI) model and incorporates a simple network transport layer |
US7921225B2 (en) | 2000-01-31 | 2011-04-05 | Telecommunication Systems, Inc. | Routing messages in a client server environment over multiple networks |
US7689696B2 (en) | 2000-01-31 | 2010-03-30 | Telecommunication Systems, Inc. | System and method for re-directing requests from browsers for communications over non-IP based networks |
US20060167972A1 (en) * | 2000-01-31 | 2006-07-27 | Zombek James M | System and method for re-directing requests from browsers for communications over non-IP based networks |
US6678273B1 (en) * | 2000-02-10 | 2004-01-13 | Semaphore Corporation | Managed private network system |
US20040218584A1 (en) * | 2000-02-10 | 2004-11-04 | Garth Brown | Managed private network system |
US20050226247A1 (en) * | 2000-02-10 | 2005-10-13 | Garth Brown | Managed private network system |
US20090016326A1 (en) * | 2000-02-10 | 2009-01-15 | Garth Brown | Managed private network system |
US20020023170A1 (en) * | 2000-03-02 | 2002-02-21 | Seaman Michael J. | Use of active topology protocols, including the spanning tree, for resilient redundant connection of an edge device |
US6826613B1 (en) * | 2000-03-15 | 2004-11-30 | 3Com Corporation | Virtually addressing storage devices through a switch |
US7917745B2 (en) | 2000-04-07 | 2011-03-29 | Intertrust Technologies Corporation | Network communications security agent |
US20060031249A1 (en) * | 2000-04-07 | 2006-02-09 | Intertrust Technologies Corp. | Ticketing and keying for orchestrating distribution of network content |
US7266681B1 (en) | 2000-04-07 | 2007-09-04 | Intertrust Technologies Corp. | Network communications security agent |
US20090125712A1 (en) * | 2000-04-07 | 2009-05-14 | Intertrust Technologies Corp. | Network communications security agent |
US20070294525A1 (en) * | 2000-04-07 | 2007-12-20 | Intertrust Technologies Corp. | Network Communications Security Agent |
US7500006B2 (en) * | 2000-04-07 | 2009-03-03 | Intertrust Technologies Corp. | Ticketing and keying for orchestrating distribution of network content |
US7085839B1 (en) | 2000-04-07 | 2006-08-01 | Intertrust Technologies Corporation | Network content management |
US6973499B1 (en) * | 2000-04-07 | 2005-12-06 | Intertrust Technologies Corp. | Ticketing and keying for orchestrating distribution of network content |
US7454609B2 (en) | 2000-04-07 | 2008-11-18 | Intertrust Technologies Corp. | Network communications security agent |
US20020009078A1 (en) * | 2000-05-12 | 2002-01-24 | Tim Wilson | Server and method for providing specific network services |
US7356841B2 (en) * | 2000-05-12 | 2008-04-08 | Solutioninc Limited | Server and method for providing specific network services |
US20020031142A1 (en) * | 2000-06-02 | 2002-03-14 | Feridun Metin | Switched ethernet networks |
US7136351B2 (en) * | 2000-06-02 | 2006-11-14 | International Business Machines Corporation | Switched ethernet networks |
US7792058B1 (en) * | 2000-06-16 | 2010-09-07 | Extreme Networks, Inc. | Method and system for VLAN aggregation |
US6914905B1 (en) | 2000-06-16 | 2005-07-05 | Extreme Networks, Inc. | Method and system for VLAN aggregation |
US8909793B2 (en) | 2000-06-29 | 2014-12-09 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an Internet telephony system |
US20050021761A1 (en) * | 2000-06-29 | 2005-01-27 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an internet telephony system |
US20090147773A1 (en) * | 2000-06-29 | 2009-06-11 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an internet telephony system |
US7444407B2 (en) | 2000-06-29 | 2008-10-28 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an internet telephony system |
US8185636B2 (en) | 2000-06-29 | 2012-05-22 | Transnexus, Inc. | Intelligent end user devices for clearinghouse services in an internet telephony system |
US20020001310A1 (en) * | 2000-06-29 | 2002-01-03 | Khanh Mai | Virtual multicasting |
US7032029B1 (en) | 2000-07-07 | 2006-04-18 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
US9525620B2 (en) | 2000-07-10 | 2016-12-20 | Alterwan, Inc. | Private tunnel usage to create wide area network backbone over the internet |
US9985800B2 (en) | 2000-07-10 | 2018-05-29 | Alterwan, Inc. | VPN usage to create wide area network backbone over the internet |
US8595478B2 (en) * | 2000-07-10 | 2013-11-26 | AlterWAN Inc. | Wide area network with high quality of service |
US9667534B2 (en) | 2000-07-10 | 2017-05-30 | Alterwan, Inc. | VPN usage to create wide area network backbone over the internet |
US20080219254A1 (en) * | 2000-07-10 | 2008-09-11 | Alterwan, Inc. | Wide area network using internet with high quality of service |
US9015471B2 (en) | 2000-07-10 | 2015-04-21 | Alterwan, Inc. | Inter-autonomous networking involving multiple service providers |
US20060155998A1 (en) * | 2000-09-11 | 2006-07-13 | Transnexus, Inc. | Clearinghouse server for internet telephony and multimedia communications |
US9094504B2 (en) | 2000-09-11 | 2015-07-28 | Transnexus, Inc. | Clearinghouse server for internet telephony and multimedia communications |
US7912067B2 (en) | 2000-09-11 | 2011-03-22 | Transnexus, Inc. | Clearinghouse server for internet telephony and multimedia communications |
US9979830B2 (en) | 2000-09-11 | 2018-05-22 | Transnexus, Inc. | Clearinghouse server for internet telephony and multimedia communications |
US8289974B2 (en) | 2000-09-11 | 2012-10-16 | Transnexus, Inc. | Clearinghouse server for internet telephony and multimedia communications |
US7197555B1 (en) * | 2000-09-13 | 2007-03-27 | Canon Kabushiki Kaisha | Directory server tracking tool |
US9667604B2 (en) | 2000-09-13 | 2017-05-30 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US9258280B1 (en) | 2000-09-13 | 2016-02-09 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US9391964B2 (en) | 2000-09-13 | 2016-07-12 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US20110032942A1 (en) * | 2000-09-13 | 2011-02-10 | Fortinet, Inc. | Fast path complex flow processing |
US9124555B2 (en) | 2000-09-13 | 2015-09-01 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US8260918B2 (en) | 2000-09-13 | 2012-09-04 | Fortinet, Inc. | Packet routing system and method |
US8069233B2 (en) | 2000-09-13 | 2011-11-29 | Fortinet, Inc. | Switch management system and method |
US7444398B1 (en) | 2000-09-13 | 2008-10-28 | Fortinet, Inc. | System and method for delivering security services |
US9160716B2 (en) | 2000-09-13 | 2015-10-13 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US9853948B2 (en) | 2000-09-13 | 2017-12-26 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US7539744B2 (en) | 2000-09-13 | 2009-05-26 | Fortinet, Inc. | Network operating system for maintaining redundant master control blade management information |
US8250357B2 (en) | 2000-09-13 | 2012-08-21 | Fortinet, Inc. | Tunnel interface for securing traffic over a network |
US20080186877A1 (en) * | 2000-10-17 | 2008-08-07 | Baldonado Omar C | Method and apparatus for coordinating routing parameters via a back-channel communication medium |
US7840704B2 (en) | 2000-10-17 | 2010-11-23 | Avaya Inc. | Method and apparatus for performance and cost optimization in an internetwork |
US7675868B2 (en) * | 2000-10-17 | 2010-03-09 | Avaya Inc. | Method and apparatus for coordinating routing parameters via a back-channel communication medium |
US7773536B2 (en) | 2000-10-17 | 2010-08-10 | Avaya Inc. | Method and apparatus for the assessment and optimization of network traffic |
US7720959B2 (en) | 2000-10-17 | 2010-05-18 | Avaya Inc. | Method and apparatus for characterizing the quality of a network path |
US6978300B1 (en) * | 2000-10-19 | 2005-12-20 | International Business Machines Corporation | Method and apparatus to perform fabric management |
US6941350B1 (en) | 2000-10-19 | 2005-09-06 | International Business Machines Corporation | Method and apparatus for reliably choosing a master network manager during initialization of a network computing system |
US6981025B1 (en) | 2000-10-19 | 2005-12-27 | International Business Machines Corporation | Method and apparatus for ensuring scalable mastership during initialization of a system area network |
US7099955B1 (en) | 2000-10-19 | 2006-08-29 | International Business Machines Corporation | End node partitioning using LMC for a system area network |
US6990528B1 (en) | 2000-10-19 | 2006-01-24 | International Business Machines Corporation | System area network of end-to-end context via reliable datagram domains |
US7636772B1 (en) | 2000-10-19 | 2009-12-22 | International Business Machines Corporation | Method and apparatus for dynamic retention of system area network management information in non-volatile store |
US7113995B1 (en) | 2000-10-19 | 2006-09-26 | International Business Machines Corporation | Method and apparatus for reporting unauthorized attempts to access nodes in a network computing system |
US20050102388A1 (en) * | 2000-10-24 | 2005-05-12 | Microsoft Corporation | System and method for restricting data transfers and managing software components of distributed computers |
US20050097147A1 (en) * | 2000-10-24 | 2005-05-05 | Microsoft Corporation | System and method for distributed management of shared computers |
US20060149838A1 (en) * | 2000-10-24 | 2006-07-06 | Microsoft Corporation | System and Method for Logical Modeling of Distributed Computer Systems |
US7711121B2 (en) | 2000-10-24 | 2010-05-04 | Microsoft Corporation | System and method for distributed management of shared computers |
US7395320B2 (en) | 2000-10-24 | 2008-07-01 | Microsoft Corporation | Providing automatic policy enforcement in a multi-computer service application |
US20050192971A1 (en) * | 2000-10-24 | 2005-09-01 | Microsoft Corporation | System and method for restricting data transfers and managing software components of distributed computers |
US7370103B2 (en) | 2000-10-24 | 2008-05-06 | Hunt Galen C | System and method for distributed management of shared computers |
US7606898B1 (en) | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US20050097058A1 (en) * | 2000-10-24 | 2005-05-05 | Microsoft Corporation | System and method for distributed management of shared computers |
US7406517B2 (en) | 2000-10-24 | 2008-07-29 | Microsoft Corporation | System and method for distributed management of shared computers |
US7574343B2 (en) | 2000-10-24 | 2009-08-11 | Microsoft Corporation | System and method for logical modeling of distributed computer systems |
US7739380B2 (en) | 2000-10-24 | 2010-06-15 | Microsoft Corporation | System and method for distributed management of shared computers |
US7158488B2 (en) | 2000-10-31 | 2007-01-02 | Yamaha Corporation | Communication control apparatus and method |
US20020080783A1 (en) * | 2000-10-31 | 2002-06-27 | Yamaha Corporation | Communication control apparatus and method |
US7023795B1 (en) | 2000-11-07 | 2006-04-04 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
US6934261B1 (en) | 2000-11-17 | 2005-08-23 | Advanced Micro Devices, Inc. | Method to select dynamically between MACs of network device depending on network topology |
US6701406B1 (en) | 2000-11-17 | 2004-03-02 | Advanced Micro Devices, Inc. | PCI and MII compatible home phoneline networking alliance (HPNA) interface device |
US6947438B1 (en) | 2000-11-17 | 2005-09-20 | Advanced Micro Devices, Inc. | PCI and MII compatible home phoneline networking alliance (HPNA) interface device |
US6781989B1 (en) | 2000-11-17 | 2004-08-24 | Advanced Micro Devices, Inc. | Method to support VLANs on a phoneline network |
US6853645B1 (en) | 2000-11-17 | 2005-02-08 | Advanced Micro Devices, Inc. | PCI and MII compatible home phoneline networking alliance (HPNA) interface device |
US6894999B1 (en) | 2000-11-17 | 2005-05-17 | Advanced Micro Devices, Inc. | Combining VLAN tagging with other network protocols allows a user to transfer data on a network with enhanced security |
US20070286108A1 (en) * | 2000-11-22 | 2007-12-13 | Robert Meier | System and method for grouping multiple vlans into a single 802.11 ip multicast domain |
US7944925B2 (en) * | 2000-11-22 | 2011-05-17 | Cisco Technology, Inc. | System and method for grouping multiple VLANs into a single 802.11 IP multicast domain |
US20020073257A1 (en) * | 2000-12-07 | 2002-06-13 | Ibm Corporation | Transferring foreign protocols across a system area network |
US20020078370A1 (en) * | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Controlled information flow between communities via a firewall |
US7296291B2 (en) * | 2000-12-18 | 2007-11-13 | Sun Microsystems, Inc. | Controlled information flow between communities via a firewall |
US20020075877A1 (en) * | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Community separation control in a multi-community node |
WO2002062038A2 (en) * | 2000-12-18 | 2002-08-08 | Sun Microsystems, Inc. | Community separation control in a multi-community node |
WO2002062038A3 (en) * | 2000-12-18 | 2003-07-24 | Sun Microsystems Inc | Community separation control in a multi-community node |
US6760330B2 (en) * | 2000-12-18 | 2004-07-06 | Sun Microsystems, Inc. | Community separation control in a multi-community node |
US20020082936A1 (en) * | 2000-12-21 | 2002-06-27 | Nokia Corporation | Simulated speed-of-light delay for recreational benefit applications |
US20070061418A1 (en) * | 2000-12-21 | 2007-03-15 | Berg Mitchell T | Method and system for initiating execution of software in response to a state |
US7512686B2 (en) | 2000-12-21 | 2009-03-31 | Berg Mitchell T | Method and system for establishing a data structure of a connection with a client |
US20070061437A1 (en) * | 2000-12-21 | 2007-03-15 | Berg Mitchell T | Method and system for identifying a computing device in response to an information packet |
US20070061470A1 (en) * | 2000-12-21 | 2007-03-15 | Berg Mitchell T | Method and system for selecting a computing device for maintaining a client session in response to a request packet |
US20070061417A1 (en) * | 2000-12-21 | 2007-03-15 | Berg Mitchell T | Method and system for selectively initiating execution of a software object |
US20020112085A1 (en) * | 2000-12-21 | 2002-08-15 | Berg Mitchell T. | Method and system for communicating an information packet through multiple networks |
US20070067046A1 (en) * | 2000-12-21 | 2007-03-22 | Berg Mitchell T | Method and system for communicating an information packet through multiple networks |
US7506063B2 (en) | 2000-12-21 | 2009-03-17 | Noatak Software Llc | Method and system for initiating execution of software in response to a state |
US20020116475A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating a request packet in response to a state |
US7287090B1 (en) | 2000-12-21 | 2007-10-23 | Noatak Software, Llc | Method and system for identifying a computing device in response to a request packet |
US20020112087A1 (en) * | 2000-12-21 | 2002-08-15 | Berg Mitchell T. | Method and system for establishing a data structure of a connection with a client |
US7640298B2 (en) | 2000-12-21 | 2009-12-29 | Berg Mitchell T | Method and system for communicating an information packet through multiple router devices |
US7406538B2 (en) | 2000-12-21 | 2008-07-29 | Noatak Software Llc | Method and system for identifying a computing device in response to an information packet |
US20020120761A1 (en) * | 2000-12-21 | 2002-08-29 | Berg Mitchell T. | Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation |
US20070086360A1 (en) * | 2000-12-21 | 2007-04-19 | Berg Mitchell T | Method and system for communicating an information packet through multiple router devices |
US9100409B2 (en) | 2000-12-21 | 2015-08-04 | Noatak Software Llc | Method and system for selecting a computing device for maintaining a client session in response to a request packet |
US7418522B2 (en) * | 2000-12-21 | 2008-08-26 | Noatak Software Llc | Method and system for communicating an information packet through multiple networks |
US7421505B2 (en) | 2000-12-21 | 2008-09-02 | Noatak Software Llc | Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation |
US8341290B2 (en) | 2000-12-21 | 2012-12-25 | Noatak Software Llc | Method and system for selecting a computing device for maintaining a client session in response to a request packet |
US7251788B2 (en) * | 2000-12-21 | 2007-07-31 | Nokia Corporation | Simulated speed-of-light delay for recreational benefit applications |
US7546369B2 (en) | 2000-12-21 | 2009-06-09 | Berg Mitchell T | Method and system for communicating a request packet in response to a state |
US7649876B2 (en) | 2000-12-21 | 2010-01-19 | Berg Mitchell T | Method and system for communicating an information packet through multiple router devices |
US7203768B2 (en) * | 2000-12-22 | 2007-04-10 | Intel Corporation | Managing network traffic using hashing functions |
US20020129133A1 (en) * | 2000-12-22 | 2002-09-12 | Olsen Gregory P. | Managing network traffic using hashing functions |
US6912199B1 (en) | 2000-12-28 | 2005-06-28 | Advanced Micro Devices, Inc. | Method to select transmission rate for network device |
US6912592B2 (en) | 2001-01-05 | 2005-06-28 | Extreme Networks, Inc. | Method and system of aggregate multiple VLANs in a metropolitan area network |
US20020091795A1 (en) * | 2001-01-05 | 2002-07-11 | Michael Yip | Method and system of aggregate multiple VLANs in a metropolitan area network |
US8306020B2 (en) | 2001-01-11 | 2012-11-06 | Transnexus, Inc. | Architectures for clearing and settlement services between Internet telephony clearinghouses |
US9088628B2 (en) | 2001-01-11 | 2015-07-21 | Transnexus, Inc. | Architectures for clearing and settlement services between internet telephony clearinghouses |
US7525956B2 (en) | 2001-01-11 | 2009-04-28 | Transnexus, Inc. | Architectures for clearing and settlement services between internet telephony clearinghouses |
US20090245237A1 (en) * | 2001-01-11 | 2009-10-01 | Transnexus, Inc. | Architectures for clearing and settlement services between internet telephony clearinghouses |
US20060067307A1 (en) * | 2001-01-11 | 2006-03-30 | Transnexus, Inc. | Architectures for clearing and settlement services between internet telephony clearinghouses |
US20020107984A1 (en) * | 2001-02-08 | 2002-08-08 | International Business Machines Corporation | Combining network management information with application information on a computer network |
US20020107955A1 (en) * | 2001-02-08 | 2002-08-08 | International Business Machines Corporation | Protocol data unit prioritization in a data processing network |
US6874036B2 (en) * | 2001-02-08 | 2005-03-29 | International Business Machines Corporation | Network management server combining PDUs to minimize bandwidth consumption at data link layer |
US20020107949A1 (en) * | 2001-02-08 | 2002-08-08 | International Business Machines Corporation | Polling for and transfer of protocol data units in a data processing network |
US7142563B1 (en) | 2001-02-20 | 2006-11-28 | At&T Corp. | Service interface for QoS-driven HPNA networks |
WO2002075497A3 (en) * | 2001-03-16 | 2003-04-17 | Kenetec Inc | Methods and apparatus for delivering multimedia communications services to multiple tenants in a building |
WO2002075497A2 (en) * | 2001-03-16 | 2002-09-26 | Kenetec, Inc. | Methods and apparatus for delivering multimedia communications services to multiple tenants in a building |
US9491126B2 (en) | 2001-03-26 | 2016-11-08 | Salesforce.Com, Inc. | Routing messages between applications |
US9467405B2 (en) * | 2001-03-26 | 2016-10-11 | Salesforce.Com, Inc. | Routing messages between applications |
US9948644B2 (en) | 2001-03-26 | 2018-04-17 | Salesforce.Com, Inc. | Routing messages between applications |
US20160028668A1 (en) * | 2001-03-26 | 2016-01-28 | Salesforce.Com, Inc. | Routing messages between applications |
US20100005287A1 (en) * | 2001-03-27 | 2010-01-07 | Micron Technology, Inc. | Data security for digital data storage |
US9003177B2 (en) | 2001-03-27 | 2015-04-07 | Micron Technology, Inc. | Data security for digital data storage |
US8191159B2 (en) | 2001-03-27 | 2012-05-29 | Micron Technology, Inc | Data security for digital data storage |
US20020146002A1 (en) * | 2001-04-10 | 2002-10-10 | Takayuki Sato | Network administration apparatus, network administrating program, network administrating method and computer network system |
US7180855B1 (en) * | 2001-04-19 | 2007-02-20 | At&T Corp. | Service interface for QoS-driven HPNA networks |
US7171453B2 (en) * | 2001-04-19 | 2007-01-30 | Hitachi, Ltd. | Virtual private volume method and system |
US20020156867A1 (en) * | 2001-04-19 | 2002-10-24 | Naoko Iwami | Virtual private volume method and system |
US20020159452A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for virtual addressing in a communications network |
US20020159446A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for interswitch load balancing in a communications network |
US20020159456A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for multicasting in a routing device |
US20020159468A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for administrative ports in a routing device |
US7068666B2 (en) | 2001-04-27 | 2006-06-27 | The Boeing Company | Method and system for virtual addressing in a communications network |
US7068667B2 (en) | 2001-04-27 | 2006-06-27 | The Boeing Company | Method and system for path building in a communications network |
US20040004966A1 (en) * | 2001-04-27 | 2004-01-08 | Foster Michael S. | Using virtual identifiers to route transmitted data through a network |
US20020184529A1 (en) * | 2001-04-27 | 2002-12-05 | Foster Michael S. | Communicating data through a network |
US20020188754A1 (en) * | 2001-04-27 | 2002-12-12 | Foster Michael S. | Method and system for domain addressing in a communications network |
US7042877B2 (en) | 2001-04-27 | 2006-05-09 | The Boeing Company | Integrated analysis of incoming data transmissions |
US20020159451A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for path building in a communications network |
US20030204618A1 (en) * | 2001-04-27 | 2003-10-30 | Foster Michael S. | Using virtual identifiers to process received data routed through a network |
US20030202536A1 (en) * | 2001-04-27 | 2003-10-30 | Foster Michael S. | Integrated analysis of incoming data transmissions |
US20020167902A1 (en) * | 2001-04-27 | 2002-11-14 | Foster Michael S. | Method and system for performing security via virtual addressing in a communications network |
US20020159389A1 (en) * | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for connection preemption in a communications network |
US6996058B2 (en) | 2001-04-27 | 2006-02-07 | The Boeing Company | Method and system for interswitch load balancing in a communications network |
US8194685B2 (en) * | 2001-05-01 | 2012-06-05 | At&T Intellectual Property Ii, L.P. | Method and system for managing multiple networks over a set of ports |
US20090067442A1 (en) * | 2001-05-01 | 2009-03-12 | Thomas Joseph Killian | Method and system for managing multiple networks over a set of ports |
US20020184222A1 (en) * | 2001-05-04 | 2002-12-05 | Kohut Eric J. | Chaining database records that represent a single customer or multiple customers living in a household |
US6912540B2 (en) * | 2001-05-04 | 2005-06-28 | Ncr Corporation | Chaining database records that represent a single customer or multiple customers living in a household |
US7480707B2 (en) * | 2001-05-16 | 2009-01-20 | International Business Machines Corporation | Network communications management system and method |
US20020174208A1 (en) * | 2001-05-16 | 2002-11-21 | International Business Machines Corporation | Network communications management system and method |
US7099285B1 (en) * | 2001-06-15 | 2006-08-29 | Advanced Micro Devices, Inc. | Remote configuration of a subnet configuration table in a network device |
US7890663B2 (en) | 2001-06-28 | 2011-02-15 | Fortinet, Inc. | Identifying nodes in a ring network |
US20060265519A1 (en) * | 2001-06-28 | 2006-11-23 | Fortinet, Inc. | Identifying nodes in a ring network |
US9998337B2 (en) | 2001-06-28 | 2018-06-12 | Fortinet, Inc. | Identifying nodes in a ring network |
US20070058648A1 (en) * | 2001-06-28 | 2007-03-15 | Fortinet, Inc. | Identifying nodes in a ring network |
US7580373B2 (en) | 2001-06-28 | 2009-08-25 | Fortinet, Inc. | Identifying nodes in a ring network |
US9602303B2 (en) | 2001-06-28 | 2017-03-21 | Fortinet, Inc. | Identifying nodes in a ring network |
US8751647B1 (en) * | 2001-06-30 | 2014-06-10 | Extreme Networks | Method and apparatus for network login authorization |
US7124228B2 (en) | 2001-07-10 | 2006-10-17 | Sun Microsystems, Inc. | Bus communication architecture, in particular for multicomputing systems |
US20030074513A1 (en) * | 2001-07-10 | 2003-04-17 | Vladimir Grouzdev | Bus communication architecture, in particular for multicomputing systems |
US7243374B2 (en) | 2001-08-08 | 2007-07-10 | Microsoft Corporation | Rapid application security threat analysis |
US8271672B1 (en) * | 2001-08-31 | 2012-09-18 | Juniper Networks, Inc. | Guaranteed bandwidth memory apparatus and method |
US8706896B2 (en) | 2001-08-31 | 2014-04-22 | Juniper Networks, Inc. | Guaranteed bandwidth memory apparatus and method |
US20030055961A1 (en) * | 2001-09-20 | 2003-03-20 | Minoru Torii | Network device management apparatus, management system, and management method, and network device |
US7020145B1 (en) * | 2001-09-24 | 2006-03-28 | Hewlett-Packard Development Company, L.P. | Network topology manager |
US20050089029A1 (en) * | 2001-09-27 | 2005-04-28 | Heiko Ruhnke | Method for operating a transmission system and transmission system in an energy supply network |
US7609689B1 (en) * | 2001-09-27 | 2009-10-27 | Cisco Technology, Inc. | System and method for mapping an index into an IPv6 address |
US20030061379A1 (en) * | 2001-09-27 | 2003-03-27 | International Business Machines Corporation | End node partitioning using virtualization |
US7093024B2 (en) * | 2001-09-27 | 2006-08-15 | International Business Machines Corporation | End node partitioning using virtualization |
US20030067914A1 (en) * | 2001-09-28 | 2003-04-10 | Seog-Hee Kim | Apparatus and method of providing network connection of data processing terminals |
US20030069954A1 (en) * | 2001-10-05 | 2003-04-10 | Adc Telecommunications, Inc. | Subnet pooling |
US7039705B2 (en) * | 2001-10-26 | 2006-05-02 | Hewlett-Packard Development Company, L.P. | Representing capacities and demands in a layered computing environment using normalized values |
US7054934B2 (en) * | 2001-10-26 | 2006-05-30 | Hewlett-Packard Development Company, L.P. | Tailorable optimization using model descriptions of services and servers in a computing environment |
US20030084156A1 (en) * | 2001-10-26 | 2003-05-01 | Hewlett-Packard Company | Method and framework for generating an optimized deployment of software applications in a distributed computing environment using layered model descriptions of services and servers |
US7035930B2 (en) * | 2001-10-26 | 2006-04-25 | Hewlett-Packard Development Company, L.P. | Method and framework for generating an optimized deployment of software applications in a distributed computing environment using layered model descriptions of services and servers |
US20030084157A1 (en) * | 2001-10-26 | 2003-05-01 | Hewlett Packard Company | Tailorable optimization using model descriptions of services and servers in a computing environment |
US6766482B1 (en) | 2001-10-31 | 2004-07-20 | Extreme Networks | Ethernet automatic protection switching |
US7698454B1 (en) | 2001-11-26 | 2010-04-13 | Juniper Networks, Inc. | Interfacing with streams of differing speeds |
US20100138554A1 (en) * | 2001-11-26 | 2010-06-03 | Juniper Networks, Inc. | Interfacing with streams of differing speeds |
US8131854B2 (en) | 2001-11-26 | 2012-03-06 | Juniper Networks, Inc. | Interfacing with streams of differing speeds |
US20030101239A1 (en) * | 2001-11-27 | 2003-05-29 | Takeshi Ishizaki | Storage device with VLAN support |
US7366784B2 (en) | 2001-11-27 | 2008-04-29 | Hitachi, Ltd. | System and method for providing and using a VLAN-aware storage device |
US20030101253A1 (en) * | 2001-11-29 | 2003-05-29 | Takayuki Saito | Method and system for distributing data in a network |
US8966611B2 (en) * | 2001-12-20 | 2015-02-24 | Mircosoft Technology Licensing, LLC | Method and apparatus for local area networks |
US20080301442A1 (en) * | 2001-12-20 | 2008-12-04 | Cranite Systems, Inc. | Method and Apparatus for Local Area Networks |
US20040141617A1 (en) * | 2001-12-20 | 2004-07-22 | Volpano Dennis Michael | Public access point |
US7703132B2 (en) | 2001-12-20 | 2010-04-20 | Microsoft Corporation | Bridged cryptographic VLAN |
US20110126278A1 (en) * | 2001-12-20 | 2011-05-26 | Microsoft Corporation | Method and apparatus for local area networks |
EP2469772A3 (en) * | 2001-12-20 | 2014-02-19 | Microsoft Corporation | Personal virtual bridged local area networks |
US20060206944A1 (en) * | 2001-12-20 | 2006-09-14 | Cranite Systems, Inc. | Method and apparatus for local area networks |
US20080022390A1 (en) * | 2001-12-20 | 2008-01-24 | Cranite Systems, Inc. | Bridged cryptographic VLAN |
US7986937B2 (en) * | 2001-12-20 | 2011-07-26 | Microsoft Corporation | Public access point |
US20030120763A1 (en) * | 2001-12-20 | 2003-06-26 | Volpano Dennis Michael | Personal virtual bridged local area networks |
US8276198B2 (en) | 2001-12-20 | 2012-09-25 | Microsoft Corporation | Method and apparatus for local area networks |
EP1331766A1 (en) * | 2001-12-20 | 2003-07-30 | Alcatel | A telecommunications system employing virtual service network architecture |
US7188364B2 (en) * | 2001-12-20 | 2007-03-06 | Cranite Systems, Inc. | Personal virtual bridged local area networks |
US20080198821A1 (en) * | 2001-12-20 | 2008-08-21 | Cranite Systems, Inc. | Public Access Point |
US20080198863A1 (en) * | 2001-12-20 | 2008-08-21 | Cranite Systems, Inc. | Bridged Cryptographic VLAN |
US20030117954A1 (en) * | 2001-12-20 | 2003-06-26 | Alcatel | Telecommunications system employing virtual service network architecture |
WO2003055151A1 (en) * | 2001-12-20 | 2003-07-03 | Cranite Systems, Inc. | Personal virtual bridged local area networks |
US20110033047A1 (en) * | 2001-12-20 | 2011-02-10 | Microsoft Corporation | Bridged cryptographic vlan |
US8347377B2 (en) | 2001-12-20 | 2013-01-01 | Microsoft Corporation | Bridged cryptographic VLAN |
EP2640008A3 (en) * | 2001-12-20 | 2014-12-10 | Microsoft Corporation | Personal virtual bridged local area networks |
US7644437B2 (en) | 2001-12-20 | 2010-01-05 | Microsoft Corporation | Method and apparatus for local area networks |
US20130024692A1 (en) * | 2001-12-20 | 2013-01-24 | Microsoft Corporation | Method and apparatus for local area networks |
US7818796B2 (en) | 2001-12-20 | 2010-10-19 | Microsoft Corporation | Bridged cryptographic VLAN |
US7886354B2 (en) | 2001-12-20 | 2011-02-08 | Microsoft Corporation | Method and apparatus for local area networks |
US7877080B2 (en) | 2001-12-20 | 2011-01-25 | Microsoft Corporation | Public access point |
US7212536B2 (en) * | 2001-12-27 | 2007-05-01 | Alcatel-Lucent Canada Inc. | User priority mapping in bridged VLANS |
US20030123460A1 (en) * | 2001-12-27 | 2003-07-03 | Mackiewich Blair T. | User priority mapping in bridged VLANS |
US8189538B2 (en) | 2002-01-11 | 2012-05-29 | Broadcom Corporation | Reconfiguration of a communication system |
US20090225679A1 (en) * | 2002-01-11 | 2009-09-10 | Broadcom Corporation | Reconfiguration of a communication system |
US7689210B1 (en) | 2002-01-11 | 2010-03-30 | Broadcom Corporation | Plug-n-playable wireless communication system |
US8144640B2 (en) | 2002-01-11 | 2012-03-27 | Broadcom Corporation | Location tracking in a wireless communication system using power levels of packets received by repeaters |
US20030133422A1 (en) * | 2002-01-11 | 2003-07-17 | Harry Bims | Mobility support via routing |
US8064380B2 (en) | 2002-01-11 | 2011-11-22 | Broadcom Corporation | Reconfiguration of a communication system |
US20080031185A1 (en) * | 2002-01-11 | 2008-02-07 | Broadcom Corporation | Tracking multiple interface connections by mobile stations |
US8027637B1 (en) | 2002-01-11 | 2011-09-27 | Broadcom Corporation | Single frequency wireless communication system |
US7672274B2 (en) | 2002-01-11 | 2010-03-02 | Broadcom Corporation | Mobility support via routing |
US7515557B1 (en) | 2002-01-11 | 2009-04-07 | Broadcom Corporation | Reconfiguration of a communication system |
US20100189013A1 (en) * | 2002-01-11 | 2010-07-29 | Broadcom Corporation | Plug-In-Playable Wireless Communication System |
US7876704B1 (en) * | 2002-01-11 | 2011-01-25 | Broadcom Corporation | Tunneling protocols for wireless communications |
US20030140163A1 (en) * | 2002-01-22 | 2003-07-24 | Conexant Systems, Inc. | Low-processor-load aggregation |
US20030145118A1 (en) * | 2002-01-25 | 2003-07-31 | Volpano Dennis Michael | Bridged cryptographic VLAN |
US20140337966A1 (en) * | 2002-01-25 | 2014-11-13 | Microsoft Corporation | Public access point |
US9730070B2 (en) * | 2002-01-25 | 2017-08-08 | Microsoft Technology Licensing, Llc | Public access point |
US7120791B2 (en) * | 2002-01-25 | 2006-10-10 | Cranite Systems, Inc. | Bridged cryptographic VLAN |
US7313135B2 (en) * | 2002-01-31 | 2007-12-25 | Mosaid Technologies, Inc. | Trunking in a matrix |
US8165117B2 (en) | 2002-01-31 | 2012-04-24 | Mosaid Technologies Incorporated | Trunking in a matrix |
US20030142668A1 (en) * | 2002-01-31 | 2003-07-31 | Mosaid Technologies, Inc. | Trunking in a matrix |
US8718056B2 (en) | 2002-01-31 | 2014-05-06 | Mosaid Technologies Incorporated | Trunking in a matrix |
US20080123528A1 (en) * | 2002-01-31 | 2008-05-29 | Wyatt Richard M | Trunking in a matrix |
US20030161274A1 (en) * | 2002-02-26 | 2003-08-28 | Binder Douglas B. | Network switch discovery method and apparatus |
US7035266B2 (en) * | 2002-02-26 | 2006-04-25 | Fluke Corporation | Network switch discovery method and apparatus |
US7478167B2 (en) | 2002-03-18 | 2009-01-13 | Nortel Networks Limited | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks |
WO2003079614A1 (en) * | 2002-03-18 | 2003-09-25 | Nortel Networks Limited | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks |
US20030177221A1 (en) * | 2002-03-18 | 2003-09-18 | Hamid Ould-Brahim | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 Virtual Private Networks |
US20030198189A1 (en) * | 2002-04-19 | 2003-10-23 | Dave Roberts | Network system having an instructional sequence for performing packet processing and optimizing the packet processing |
US20030200295A1 (en) * | 2002-04-19 | 2003-10-23 | Roberts David Gary | Network system having a virtual-service-module |
US7804785B2 (en) | 2002-04-19 | 2010-09-28 | Avaya Inc. | Network system having an instructional sequence for performing packet processing and optimizing the packet processing |
US7197553B2 (en) | 2002-04-19 | 2007-03-27 | Nortel Networks Limited | Network system having a virtual-service-module |
US7154861B1 (en) * | 2002-04-22 | 2006-12-26 | Extreme Networks | Method and system for a virtual local area network to span multiple loop free network topology domains |
US20030212776A1 (en) * | 2002-05-07 | 2003-11-13 | Roberts David Gary | Methods and systems for changing a topology of a network |
US7246178B2 (en) | 2002-05-07 | 2007-07-17 | Nortel Networks Limited | Methods and systems for changing a topology of a network |
US7386628B1 (en) | 2002-05-08 | 2008-06-10 | Nortel Networks Limited | Methods and systems for processing network data packets |
US6883010B2 (en) * | 2002-05-14 | 2005-04-19 | Sun Microsystems, Inc. | Facilitating failover to a secondary file server in a highly available file system |
US20030217030A1 (en) * | 2002-05-14 | 2003-11-20 | Byrne Michael J. | Facilitating failover to a secondary file server in a highly available file system |
US9215178B2 (en) | 2002-06-04 | 2015-12-15 | Cisco Technology, Inc. | Network packet steering via configurable association of packet processing resources and network interfaces |
US20070109968A1 (en) * | 2002-06-04 | 2007-05-17 | Fortinet, Inc. | Hierarchical metering in a virtual router-based network switch |
US7668087B2 (en) | 2002-06-04 | 2010-02-23 | Fortinet, Inc. | Hierarchical metering in a virtual router-based network switch |
US7177311B1 (en) | 2002-06-04 | 2007-02-13 | Fortinet, Inc. | System and method for routing traffic through a virtual router-based network switch |
US20030223361A1 (en) * | 2002-06-04 | 2003-12-04 | Zahid Hussain | System and method for hierarchical metering in a virtual router based network switch |
US7340535B1 (en) | 2002-06-04 | 2008-03-04 | Fortinet, Inc. | System and method for controlling routing in a virtual router system |
US7522604B2 (en) | 2002-06-04 | 2009-04-21 | Fortinet, Inc. | Routing traffic through a virtual router-based network switch |
US8064462B2 (en) | 2002-06-04 | 2011-11-22 | Fortinet, Inc. | Service processing switch |
US7203192B2 (en) | 2002-06-04 | 2007-04-10 | Fortinet, Inc. | Network packet steering |
US20100220732A1 (en) * | 2002-06-04 | 2010-09-02 | Fortinet, Inc. | Service processing switch |
US7161904B2 (en) | 2002-06-04 | 2007-01-09 | Fortinet, Inc. | System and method for hierarchical metering in a virtual router based network switch |
US8068503B2 (en) | 2002-06-04 | 2011-11-29 | Fortinet, Inc. | Network packet steering via configurable association of processing resources and netmods or line interface ports |
US9967200B2 (en) | 2002-06-04 | 2018-05-08 | Fortinet, Inc. | Service processing switch |
US20070127382A1 (en) * | 2002-06-04 | 2007-06-07 | Fortinet, Inc. | Routing traffic through a virtual router-based network switch |
US8638802B2 (en) | 2002-06-04 | 2014-01-28 | Cisco Technology, Inc. | Network packet steering via configurable association of packet processing resources and network interfaces |
US7376125B1 (en) | 2002-06-04 | 2008-05-20 | Fortinet, Inc. | Service processing switch |
US20030223418A1 (en) * | 2002-06-04 | 2003-12-04 | Sachin Desai | Network packet steering |
US8355358B2 (en) | 2002-06-05 | 2013-01-15 | Broadcom Corporation | Distributed MAC architecture for wireless repeater |
US7643460B2 (en) | 2002-06-05 | 2010-01-05 | Broadcom Corporation | Distributed MAC architecture for a wireless repeater |
US20100177677A1 (en) * | 2002-06-05 | 2010-07-15 | Broadcom Corporation | Distributed MAC architecture for wireless repeater |
US7072960B2 (en) * | 2002-06-10 | 2006-07-04 | Hewlett-Packard Development Company, L.P. | Generating automated mappings of service demands to server capacities in a distributed computer system |
US20030236822A1 (en) * | 2002-06-10 | 2003-12-25 | Sven Graupner | Generating automated mappings of service demands to server capacites in a distributed computer system |
US7203168B1 (en) * | 2002-06-19 | 2007-04-10 | Bellsouth Intellectual Property Corp. | System and method for managing network elements in an ATM network |
US7194767B1 (en) * | 2002-06-28 | 2007-03-20 | Sprint Communications Company L.P. | Screened subnet having a secured utility VLAN |
US20070064715A1 (en) * | 2002-07-25 | 2007-03-22 | Avaya, Inc. | Method and apparatus for the assessment and optimization of network traffic |
US8023421B2 (en) | 2002-07-25 | 2011-09-20 | Avaya Inc. | Method and apparatus for the assessment and optimization of network traffic |
US8819486B2 (en) | 2002-08-29 | 2014-08-26 | Google Inc. | Fault tolerant routing in a non-hot-standby configuration of a network routing system |
US7143420B2 (en) * | 2002-08-29 | 2006-11-28 | Sun Microsystems, Inc. | Strategic technology architecture roadmap |
US7096383B2 (en) | 2002-08-29 | 2006-08-22 | Cosine Communications, Inc. | System and method for virtual router failover in a network routing system |
US20040078621A1 (en) * | 2002-08-29 | 2004-04-22 | Cosine Communications, Inc. | System and method for virtual router failover in a network routing system |
US8412982B2 (en) | 2002-08-29 | 2013-04-02 | Google Inc. | Fault tolerant routing in a non-hot-standby configuration of a network routing system |
US7278055B2 (en) | 2002-08-29 | 2007-10-02 | Fortinet, Inc. | System and method for virtual router failover in a network routing system |
US20040045014A1 (en) * | 2002-08-29 | 2004-03-04 | Rakesh Radhakrishnan | Strategic technology architecture roadmap |
US20070162783A1 (en) * | 2002-08-29 | 2007-07-12 | Fortinet, Inc. | System and method for virtual router failover in a network routing system |
US7539185B2 (en) * | 2002-10-07 | 2009-05-26 | Broadcom Corporation | Fast-path implementation for an uplink double tagging engine |
US7660313B2 (en) * | 2002-10-25 | 2010-02-09 | Huawei Technologies Co., Ltd. | Sub-rate transmission method for user data services in transmission devices of a metropolitan area network |
US20050190773A1 (en) * | 2002-10-25 | 2005-09-01 | Huawei Technologies Co., Ltd. | Sub-rate transmission method for user data services in transmission devices of a metropolitan area network |
US20040081104A1 (en) * | 2002-10-29 | 2004-04-29 | Weimin Pan | Method and system for network switch configuration |
US7522525B2 (en) | 2002-10-30 | 2009-04-21 | Fujitsu Limited | L2 switch |
US20050163132A1 (en) * | 2002-10-30 | 2005-07-28 | Hironori Mieno | L2 switch |
US20150195098A1 (en) * | 2002-11-18 | 2015-07-09 | Fortinet, Inc. | Hardware-accelerated packet multicasting |
US7266120B2 (en) | 2002-11-18 | 2007-09-04 | Fortinet, Inc. | System and method for hardware accelerated packet multicast in a virtual routing system |
US20040095934A1 (en) * | 2002-11-18 | 2004-05-20 | Cosine Communications, Inc. | System and method for hardware accelerated packet multicast in a virtual routing system |
US9407449B2 (en) * | 2002-11-18 | 2016-08-02 | Fortinet, Inc. | Hardware-accelerated packet multicasting |
US9014186B2 (en) | 2002-11-18 | 2015-04-21 | Fortinet, Inc. | Hardware-accelerated packet multicasting |
WO2004047365A1 (en) * | 2002-11-18 | 2004-06-03 | Cosine Communications, Inc. | Virtual router with hardware accelerated packet multicast |
US8644311B2 (en) | 2002-11-18 | 2014-02-04 | Fortinet, Inc. | Hardware-accelerated packet multicasting in a virtual routing system |
US10200275B2 (en) | 2002-11-18 | 2019-02-05 | Fortinet, Inc. | Hardware-accelerated packet multicasting |
US7657615B1 (en) * | 2002-12-08 | 2010-02-02 | Sun Microsystems, Inc. | Approach for provisioning network devices |
US20050198251A1 (en) * | 2002-12-10 | 2005-09-08 | Junichi Toda | Network management system |
US7508768B2 (en) * | 2002-12-13 | 2009-03-24 | Electronics And Telecommunications Research Institute | Traffic measurement system and traffic analysis method thereof |
US20050249125A1 (en) * | 2002-12-13 | 2005-11-10 | Yoon Seung H | Traffic measurement system and traffic analysis method thereof |
US20160323113A1 (en) * | 2003-01-24 | 2016-11-03 | Coco Communications Corp. | Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration |
US9866395B2 (en) * | 2003-01-24 | 2018-01-09 | Coco Communications Corp. | Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration |
US20040158615A1 (en) * | 2003-02-12 | 2004-08-12 | Keller Matthew Craig | Priority web browsing |
US7890951B2 (en) | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Model-based provisioning of test environments |
US7890543B2 (en) | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7886041B2 (en) | 2003-03-06 | 2011-02-08 | Microsoft Corporation | Design time validation of systems |
US20040210623A1 (en) * | 2003-03-06 | 2004-10-21 | Aamer Hydrie | Virtual network topology generation |
US7630877B2 (en) | 2003-03-06 | 2009-12-08 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7689676B2 (en) | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US8122106B2 (en) | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US7684964B2 (en) | 2003-03-06 | 2010-03-23 | Microsoft Corporation | Model and system state synchronization |
US20040181608A1 (en) * | 2003-03-10 | 2004-09-16 | Cypher Robert E. | Computer system with multiple classes of device IDs |
US9110853B2 (en) * | 2003-03-10 | 2015-08-18 | Oracle America, Inc. | Computer system with multiple classes of device IDs |
US7287180B1 (en) * | 2003-03-20 | 2007-10-23 | Info Value Computing, Inc. | Hardware independent hierarchical cluster of heterogeneous media servers using a hierarchical command beat protocol to synchronize distributed parallel computing systems and employing a virtual dynamic network topology for distributed parallel computing system |
US20040202185A1 (en) * | 2003-04-14 | 2004-10-14 | International Business Machines Corporation | Multiple virtual local area network support for shared network adapters |
US7184942B2 (en) * | 2003-05-22 | 2007-02-27 | Hewlett-Packard Development Company, L.P. | Verifying the configuration of a virtual network |
US20040249916A1 (en) * | 2003-05-22 | 2004-12-09 | Graves David Andrew | Verifying the configuration of a virtual network |
US7636917B2 (en) | 2003-06-30 | 2009-12-22 | Microsoft Corporation | Network load balancing with host status information |
US7567504B2 (en) | 2003-06-30 | 2009-07-28 | Microsoft Corporation | Network load balancing with traffic routing |
US7590736B2 (en) | 2003-06-30 | 2009-09-15 | Microsoft Corporation | Flexible network load balancing |
US7606929B2 (en) | 2003-06-30 | 2009-10-20 | Microsoft Corporation | Network load balancing with connection manipulation |
US7613822B2 (en) | 2003-06-30 | 2009-11-03 | Microsoft Corporation | Network load balancing with session information |
US8520681B2 (en) | 2003-07-29 | 2013-08-27 | At&T Intellectual Property I, L.P. | Broadband access for virtual private networks |
US10313306B2 (en) | 2003-07-29 | 2019-06-04 | Marlow Technologies, Llc | Broadband access for virtual private networks |
US9467373B2 (en) | 2003-07-29 | 2016-10-11 | Marlow Technologies, Llc | Broadband access for virtual private networks |
US20090028155A1 (en) * | 2003-07-29 | 2009-01-29 | At&T Intellectual Property I, L.P. | Broadband access for virtual private networks |
US11240206B2 (en) | 2003-07-29 | 2022-02-01 | Marlow Technologies, Llc | Broadband access for virtual private networks |
US8243732B2 (en) * | 2003-07-29 | 2012-08-14 | At&T Intellectual Property I, L.P. | Broadband access for virtual private networks |
US8942240B2 (en) | 2003-07-29 | 2015-01-27 | Marlow Technologies, Llc | Broadband access for virtual private networks |
US20090097406A1 (en) * | 2003-08-05 | 2009-04-16 | Scalent Systems, Inc. | Method and apparatus for achieving dynamic capacity and high availability in multi-stage data networks using adaptive flow-based routing |
US7724670B2 (en) * | 2003-08-05 | 2010-05-25 | Scalent Systems, Inc. | Method and apparatus for achieving dynamic capacity and high availability in multi-stage data networks using adaptive flow-based routing |
US7130900B2 (en) * | 2003-08-06 | 2006-10-31 | Hitachi, Ltd. | Storage network management system and method |
US20050044199A1 (en) * | 2003-08-06 | 2005-02-24 | Kenta Shiga | Storage network management system and method |
US20050089034A1 (en) * | 2003-08-07 | 2005-04-28 | Canon Kabushiki Kaisha | Network switching apparatus, route management server, network interface apparatus, control method therefor, computer program for route management server, and computer-readable storage medium |
US7782854B2 (en) * | 2003-08-07 | 2010-08-24 | Canon Kabushiki Kaisha | Network switching apparatus, route management server, network interface apparatus, control method therefor, computer program for route management server, and computer-readable storage medium |
US7568107B1 (en) | 2003-08-20 | 2009-07-28 | Extreme Networks, Inc. | Method and system for auto discovery of authenticator for network login |
US8503463B2 (en) | 2003-08-27 | 2013-08-06 | Fortinet, Inc. | Heterogeneous media packet bridging |
US9331961B2 (en) | 2003-08-27 | 2016-05-03 | Fortinet, Inc. | Heterogeneous media packet bridging |
US9853917B2 (en) | 2003-08-27 | 2017-12-26 | Fortinet, Inc. | Heterogeneous media packet bridging |
US9509638B2 (en) | 2003-08-27 | 2016-11-29 | Fortinet, Inc. | Heterogeneous media packet bridging |
US20050047098A1 (en) * | 2003-08-29 | 2005-03-03 | Sun Microsystems, Inc. | Aggregation switch |
US7209358B2 (en) * | 2003-08-29 | 2007-04-24 | Sun Microsystems, Inc. | Aggregation switch |
US7873045B2 (en) * | 2003-09-15 | 2011-01-18 | Exar Corporation | Generating an encapsulating header based on encapsulated information provided at protocol-dependent locations |
US20050068948A1 (en) * | 2003-09-15 | 2005-03-31 | Sanjay Bhardwaj | Generating an encapsulating header based on encapsulated information provided at protocol-dependent locations |
US7751416B2 (en) | 2003-09-18 | 2010-07-06 | Cisco Technology, Inc. | Virtual network device |
US7609663B2 (en) * | 2003-09-26 | 2009-10-27 | Siemens Aktiengesellschaft | Method for establishing a communication connection in a direct communication network |
US20070005720A1 (en) * | 2003-09-26 | 2007-01-04 | Ralf Neuhaus | Method for establishing a communication connection in a direct communication network |
US20050105508A1 (en) * | 2003-11-14 | 2005-05-19 | Innomedia Pte Ltd. | System for management of Internet telephony equipment deployed behind firewalls |
US20050111455A1 (en) * | 2003-11-20 | 2005-05-26 | Daiki Nozue | VLAN server |
US7420979B2 (en) * | 2003-11-20 | 2008-09-02 | Hitachi Communcation Technologies, Ltd. | VLAN server |
US20080310416A1 (en) * | 2003-11-20 | 2008-12-18 | Daiki Nozue | Vlan server |
US8094660B2 (en) * | 2003-11-20 | 2012-01-10 | Hitachi, Ltd. | VLAN server |
US20050144276A1 (en) * | 2003-12-04 | 2005-06-30 | Bird Paul M. | Method, system and mechanism to multiplex multiple application server requests over a single database connection |
US7433950B2 (en) * | 2003-12-04 | 2008-10-07 | International Business Machines Corporation | Method and mechanism to multiplex multiple application server requests over a single database connection |
US20080270609A1 (en) * | 2003-12-04 | 2008-10-30 | International Business Machines Corporation | Computer-readable medium to multiplex multiple application server requests over a single database connection |
US7933948B2 (en) * | 2003-12-04 | 2011-04-26 | International Business Machines Corporation | Computer-readable medium to multiplex multiple application server requests over a single database connection |
US20050141444A1 (en) * | 2003-12-19 | 2005-06-30 | Fujitsu Limited | Communication device management program |
US8180842B2 (en) * | 2003-12-19 | 2012-05-15 | Fujitsu Limited | Communication device management program |
US20050138171A1 (en) * | 2003-12-19 | 2005-06-23 | Slaight Thomas M. | Logical network traffic filtering |
WO2005067222A1 (en) | 2003-12-19 | 2005-07-21 | Intel Corporation | Logical network traffic filtering in vlans |
US7299246B1 (en) * | 2004-01-16 | 2007-11-20 | Landesk Software Limited | Client initiated multicast domain discovery |
US8990430B2 (en) | 2004-02-19 | 2015-03-24 | Cisco Technology, Inc. | Interface bundles in virtual network devices |
US10069765B2 (en) | 2004-02-19 | 2018-09-04 | Cisco Technology, Inc. | Interface bundles in virtual network devices |
US20050190788A1 (en) * | 2004-02-27 | 2005-09-01 | Wong Yu-Man M. | System and method for VLAN multiplexing |
US7778422B2 (en) | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
US20050190752A1 (en) * | 2004-02-27 | 2005-09-01 | Cheng-Mau Chiou | Method and system for locating the incoming port of a MAC address in an Ethernet switch network |
US9094418B2 (en) | 2004-03-11 | 2015-07-28 | Transnexus, Inc. | Method and system for routing calls over a packet switched computer network |
US8396056B2 (en) | 2004-03-11 | 2013-03-12 | Transnexus, Inc. | Method and system for routing calls over a packet switched computer network |
US7743263B2 (en) | 2004-03-11 | 2010-06-22 | Transnexus, Inc. | Method and system for routing calls over a packet switched computer network |
US20050201364A1 (en) * | 2004-03-11 | 2005-09-15 | Transnexus, Inc. | Method and system for routing calls over a packet switched computer network |
US20100278173A1 (en) * | 2004-03-11 | 2010-11-04 | Transnexus, Inc. | Method and system for routing calls over a packet switched computer network |
US11467883B2 (en) | 2004-03-13 | 2022-10-11 | Iii Holdings 12, Llc | Co-allocating a reservation spanning different compute resources types |
US11626006B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Management of a security system at a premises |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11625008B2 (en) | 2004-03-16 | 2023-04-11 | Icontrol Networks, Inc. | Premises management networking |
US11757834B2 (en) | 2004-03-16 | 2023-09-12 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11588787B2 (en) | 2004-03-16 | 2023-02-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11782394B2 (en) | 2004-03-16 | 2023-10-10 | Icontrol Networks, Inc. | Automation system with mobile interface |
US11893874B2 (en) | 2004-03-16 | 2024-02-06 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11601397B2 (en) | 2004-03-16 | 2023-03-07 | Icontrol Networks, Inc. | Premises management configuration and control |
US11656667B2 (en) | 2004-03-16 | 2023-05-23 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11810445B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US20050220109A1 (en) * | 2004-03-31 | 2005-10-06 | Fujitsu Limited | Routing table synchronization method, network apparatus, and routing table synchronization program |
US7532620B2 (en) * | 2004-03-31 | 2009-05-12 | Fujitsu Limited | Routing table synchronization method, network apparatus, and routing table synchronization program |
US7206864B2 (en) * | 2004-04-28 | 2007-04-17 | Hitachi, Ltd. | Network protocol processing device |
US20050246450A1 (en) * | 2004-04-28 | 2005-11-03 | Yutaka Enko | Network protocol processing device |
US8755382B2 (en) | 2004-04-28 | 2014-06-17 | Cisco Technology, Inc. | Intelligent adjunct network device |
US20050243826A1 (en) * | 2004-04-28 | 2005-11-03 | Smith Michael R | Intelligent adjunct network device |
US7889733B2 (en) * | 2004-04-28 | 2011-02-15 | Cisco Technology, Inc. | Intelligent adjunct network device |
US20110134923A1 (en) * | 2004-04-28 | 2011-06-09 | Smith Michael R | Intelligent Adjunct Network Device |
US9621419B2 (en) | 2004-04-28 | 2017-04-11 | Cisco Technology, Inc. | Determining when to switch to a standby intelligent adjunct network device |
US7669235B2 (en) | 2004-04-30 | 2010-02-23 | Microsoft Corporation | Secure domain join for computing devices |
US20050256935A1 (en) * | 2004-05-06 | 2005-11-17 | Overstreet Matthew L | System and method for managing a network |
US20050267986A1 (en) * | 2004-05-11 | 2005-12-01 | Hitachi, Ltd. | Virtualization switch and storage system |
US7206860B2 (en) * | 2004-05-11 | 2007-04-17 | Hitachi, Ltd. | Virtualization switch and storage system |
US7710957B2 (en) | 2004-05-19 | 2010-05-04 | Cisco Technology, Inc. | System and method for implementing multiple spanning trees per network |
US7706364B2 (en) | 2004-05-19 | 2010-04-27 | Cisco Technology, Inc. | Virtual network device clusters |
US11652706B2 (en) | 2004-06-18 | 2023-05-16 | Iii Holdings 12, Llc | System and method for providing dynamic provisioning within a compute environment |
US8059652B2 (en) | 2004-06-30 | 2011-11-15 | Cisco Technology, Inc. | Method and apparatus for detecting support for a protocol defining supplemental headers |
US7499899B2 (en) * | 2004-07-02 | 2009-03-03 | Northrop Grumman Corporation | Dynamic software integration architecture |
US20060005204A1 (en) * | 2004-07-02 | 2006-01-05 | Siegel Neil G | Dynamic software integration architecture |
US7808983B2 (en) | 2004-07-08 | 2010-10-05 | Cisco Technology, Inc. | Network device architecture for centralized packet processing |
US8929207B1 (en) | 2004-07-08 | 2015-01-06 | Cisco Technology, Inc. | Network device architecture for centralized packet processing |
US7406081B2 (en) * | 2004-07-20 | 2008-07-29 | Fujitsu Limited | Network device for remote setting operations |
US20060034272A1 (en) * | 2004-07-20 | 2006-02-16 | Naoko Kawakami | Network device |
US20060031925A1 (en) * | 2004-08-05 | 2006-02-09 | Alcatel | Access control method and apparatus |
US11630704B2 (en) | 2004-08-20 | 2023-04-18 | Iii Holdings 12, Llc | System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information |
US20090138580A1 (en) * | 2004-08-31 | 2009-05-28 | Yoshifumi Takamoto | Method of booting an operating system |
US8190717B2 (en) * | 2004-08-31 | 2012-05-29 | Hitachi, Ltd. | Method of booting an operating system |
WO2006029391A3 (en) * | 2004-09-09 | 2007-01-11 | Amx Corp | Method, system and computer program using standard interfaces for independent device controllers |
US9319303B2 (en) | 2004-09-24 | 2016-04-19 | Fortinet, Inc. | Scalable IP-services enabled multicast forwarding with efficient resource utilization |
US10038567B2 (en) | 2004-09-24 | 2018-07-31 | Fortinet, Inc. | Scalable IP-services enabled multicast forwarding with efficient resource utilization |
US9167016B2 (en) | 2004-09-24 | 2015-10-20 | Fortinet, Inc. | Scalable IP-services enabled multicast forwarding with efficient resource utilization |
US9166805B1 (en) | 2004-09-24 | 2015-10-20 | Fortinet, Inc. | Scalable IP-services enabled multicast forwarding with efficient resource utilization |
US20060078125A1 (en) * | 2004-10-08 | 2006-04-13 | Philip Cacayorin | Devices and methods for implementing cryptographic scrambling |
US20060078126A1 (en) * | 2004-10-08 | 2006-04-13 | Philip Cacayorin | Floating vector scrambling methods and apparatus |
US20060078127A1 (en) * | 2004-10-08 | 2006-04-13 | Philip Cacayorin | Dispersed data storage using cryptographic scrambling |
US20060083227A1 (en) * | 2004-10-18 | 2006-04-20 | Avigdor Eldar | Selecting one of a plurality of adapters to use to transmit a packet |
US11861404B2 (en) | 2004-11-08 | 2024-01-02 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11537435B2 (en) | 2004-11-08 | 2022-12-27 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11537434B2 (en) | 2004-11-08 | 2022-12-27 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11709709B2 (en) | 2004-11-08 | 2023-07-25 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11886915B2 (en) | 2004-11-08 | 2024-01-30 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11494235B2 (en) | 2004-11-08 | 2022-11-08 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11762694B2 (en) | 2004-11-08 | 2023-09-19 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US11656907B2 (en) | 2004-11-08 | 2023-05-23 | Iii Holdings 12, Llc | System and method of providing system jobs within a compute environment |
US9043792B1 (en) * | 2004-11-17 | 2015-05-26 | Vmware, Inc. | Virtual local area network (vlan) coordinator providing access to vlans |
US11893406B2 (en) | 2004-11-17 | 2024-02-06 | Vmware, Inc. | Using virtual local area networks in a virtual computer system |
US10768958B2 (en) | 2004-11-17 | 2020-09-08 | Vmware, Inc. | Using virtual local area networks in a virtual computer system |
US7808904B2 (en) | 2004-11-18 | 2010-10-05 | Fortinet, Inc. | Method and apparatus for managing subscriber profiles |
US20070115979A1 (en) * | 2004-11-18 | 2007-05-24 | Fortinet, Inc. | Method and apparatus for managing subscriber profiles |
US20080117917A1 (en) * | 2004-11-18 | 2008-05-22 | Fortinet, Inc. | Method and apparatus for managing subscriber profiles |
US20070250628A1 (en) * | 2004-11-26 | 2007-10-25 | Fujitsu Limited | Network/service control method |
US7949755B2 (en) * | 2004-11-26 | 2011-05-24 | Fujitsu Limited | Network/service control method |
US20060165068A1 (en) * | 2004-12-13 | 2006-07-27 | Dalton James P Jr | Method and system for securely authorized VoIP Interconnections between anonymous peers of VoIP networks |
US9392033B2 (en) | 2004-12-13 | 2016-07-12 | Transnexus, Inc. | Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks |
US7457283B2 (en) | 2004-12-13 | 2008-11-25 | Transnexus, Inc. | Method and system for securely authorized VoIP interconnections between anonymous peers of VoIP networks |
US7730183B2 (en) * | 2005-01-13 | 2010-06-01 | Microsoft Corporation | System and method for generating virtual networks |
US20060155708A1 (en) * | 2005-01-13 | 2006-07-13 | Microsoft Corporation | System and method for generating virtual networks |
US20060159114A1 (en) * | 2005-01-19 | 2006-07-20 | Mediacell Licensing Corp. | Dispersed High Level Devices in a Network Environment |
US9374277B2 (en) | 2005-02-26 | 2016-06-21 | Coco Communications Corp. | Naming system layer |
US8996679B2 (en) | 2005-02-26 | 2015-03-31 | Coco Communications Corp | Naming system layer |
US20090319646A1 (en) * | 2005-02-26 | 2009-12-24 | Tucker Mark L | Naming system layer |
US8683020B2 (en) | 2005-02-26 | 2014-03-25 | Coco Communications Corp. | Naming system layer |
US9225663B2 (en) | 2005-03-16 | 2015-12-29 | Adaptive Computing Enterprises, Inc. | System and method providing a virtual private cluster |
US11134022B2 (en) | 2005-03-16 | 2021-09-28 | Iii Holdings 12, Llc | Simple integration of an on-demand compute environment |
US20060212740A1 (en) * | 2005-03-16 | 2006-09-21 | Jackson David B | Virtual Private Cluster |
US9979672B2 (en) | 2005-03-16 | 2018-05-22 | Iii Holdings 12, Llc | System and method providing a virtual private cluster |
US11595364B2 (en) | 2005-03-16 | 2023-02-28 | Icontrol Networks, Inc. | System for data routing in networks |
US11824675B2 (en) | 2005-03-16 | 2023-11-21 | Icontrol Networks, Inc. | Networked touchscreen with integrated interfaces |
US11706045B2 (en) | 2005-03-16 | 2023-07-18 | Icontrol Networks, Inc. | Modular electronic display platform |
US10608949B2 (en) | 2005-03-16 | 2020-03-31 | Iii Holdings 12, Llc | Simple integration of an on-demand compute environment |
US9961013B2 (en) | 2005-03-16 | 2018-05-01 | Iii Holdings 12, Llc | Simple integration of on-demand compute environment |
US10333862B2 (en) | 2005-03-16 | 2019-06-25 | Iii Holdings 12, Llc | Reserving resources in an on-demand compute environment |
US8930536B2 (en) * | 2005-03-16 | 2015-01-06 | Adaptive Computing Enterprises, Inc. | Virtual private cluster |
US11356385B2 (en) | 2005-03-16 | 2022-06-07 | Iii Holdings 12, Llc | On-demand compute environment |
US11792330B2 (en) | 2005-03-16 | 2023-10-17 | Icontrol Networks, Inc. | Communication and automation in a premises management system |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US11658916B2 (en) | 2005-03-16 | 2023-05-23 | Iii Holdings 12, Llc | Simple integration of an on-demand compute environment |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US20070239391A1 (en) * | 2005-03-30 | 2007-10-11 | West James R | Method and system for simulating multiple cable modems |
US7574345B2 (en) * | 2005-03-30 | 2009-08-11 | Arris Group, Inc. | Method and system for simulating multiple cable modems |
US11496415B2 (en) | 2005-04-07 | 2022-11-08 | Iii Holdings 12, Llc | On-demand access to compute resources |
US11831564B2 (en) | 2005-04-07 | 2023-11-28 | Iii Holdings 12, Llc | On-demand access to compute resources |
US11765101B2 (en) | 2005-04-07 | 2023-09-19 | Iii Holdings 12, Llc | On-demand access to compute resources |
US11522811B2 (en) | 2005-04-07 | 2022-12-06 | Iii Holdings 12, Llc | On-demand access to compute resources |
US11533274B2 (en) | 2005-04-07 | 2022-12-20 | Iii Holdings 12, Llc | On-demand access to compute resources |
US7802144B2 (en) | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US7797147B2 (en) | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
US8489728B2 (en) | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US8260932B2 (en) * | 2005-04-27 | 2012-09-04 | International Business Machines Corporation | Using broadcast domains to manage virtual local area networks |
US20060248196A1 (en) * | 2005-04-27 | 2006-11-02 | International Business Machines Corporation | Using broadcast domains to manage virtual local area networks |
US20100073252A1 (en) * | 2005-05-04 | 2010-03-25 | Sandwave Ip, Llc | Enclosure with Ground Plane |
US20060256769A1 (en) * | 2005-05-11 | 2006-11-16 | Samsung Electronics Co., Ltd. | Method and apparatus for keeping information in routing tables consistent throughout wireless network |
US7710934B2 (en) * | 2005-05-11 | 2010-05-04 | Samsung Electronics Co., Ltd. | Method and apparatus for keeping information in routing tables consistent throughout wireless network |
US8630298B2 (en) | 2005-06-11 | 2014-01-14 | Sandwave Ip, Llc | Dispersed high level devices in a network environment |
US7684395B2 (en) * | 2005-06-22 | 2010-03-23 | Yamaha Corporation | Communication device and communication method therefor |
US20060291387A1 (en) * | 2005-06-22 | 2006-12-28 | Yamaha Corporation | Communication device and communication method therefor |
US10540159B2 (en) | 2005-06-29 | 2020-01-21 | Microsoft Technology Licensing, Llc | Model-based virtual system provisioning |
US9317270B2 (en) | 2005-06-29 | 2016-04-19 | Microsoft Technology Licensing, Llc | Model-based virtual system provisioning |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
US9811368B2 (en) | 2005-06-29 | 2017-11-07 | Microsoft Technology Licensing, Llc | Model-based virtual system provisioning |
US20070015514A1 (en) * | 2005-07-14 | 2007-01-18 | Mediacell Licensing Corp | Virtual Cells for Wireless Networks |
US20100099401A1 (en) * | 2005-07-14 | 2010-04-22 | Sandwave Ip, Llc | Virtual Cells for Wireless Networks |
US7664504B2 (en) | 2005-07-14 | 2010-02-16 | Sandwave Ip, Llc | Virtual cells for wireless networks |
US8391915B2 (en) | 2005-07-14 | 2013-03-05 | Sandwave Ip, Llc | Virtual cells for wireless networks |
US9063739B2 (en) | 2005-09-07 | 2015-06-23 | Open Invention Network, Llc | Method and computer program for device configuration |
US20100180322A1 (en) * | 2005-09-20 | 2010-07-15 | Cisco Technology, Inc. | System and method for floating port configuration |
US8670349B2 (en) * | 2005-09-20 | 2014-03-11 | Cisco Technology, Inc. | System and method for floating port configuration |
US7941309B2 (en) | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US20070124496A1 (en) * | 2005-11-30 | 2007-05-31 | Tellabs Oy | Method and equipment for making a routing decision dependent on a quality-of-service class |
US7864776B2 (en) * | 2005-11-30 | 2011-01-04 | Tellabs Oy | Method and equipment for making a routing decision dependent on a quality-of-service class |
US8238329B2 (en) | 2005-12-13 | 2012-08-07 | Transnexus, Inc. | Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks |
US8681781B2 (en) | 2005-12-13 | 2014-03-25 | Transnexus, Inc. | Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks |
US10057303B2 (en) | 2005-12-13 | 2018-08-21 | Transnexus, Inc. | Method and system for securely authorizing VoIP interconnections between anonymous peers of VoIP networks |
US20070167171A1 (en) * | 2005-12-30 | 2007-07-19 | Mediacell Licensing Corp | Determining the Location of a Device Having Two Communications Connections |
US20070198702A1 (en) * | 2005-12-30 | 2007-08-23 | Mediacell Licensing Corp | Traffic Routing Based on Geophysical Location |
US8504678B2 (en) | 2005-12-30 | 2013-08-06 | Sandwave Ip, Llc | Traffic routing based on geophysical location |
US20070159980A1 (en) * | 2006-01-12 | 2007-07-12 | Yasuo Yamaguchi | Disaster prevention system |
CN101000707B (en) * | 2006-01-12 | 2011-12-28 | 能美防灾株式会社 | Disaster prevention system |
US8134925B2 (en) * | 2006-01-12 | 2012-03-13 | Nohmi Bosai Ltd. | Disaster prevention system |
US10038668B2 (en) | 2006-01-13 | 2018-07-31 | Fortinet, Inc. | Computerized system and method for handling network traffic |
US8234361B2 (en) * | 2006-01-13 | 2012-07-31 | Fortinet, Inc. | Computerized system and method for handling network traffic |
US8495200B2 (en) | 2006-01-13 | 2013-07-23 | Fortinet, Inc. | Computerized system and method for handling network traffic |
US20070168547A1 (en) * | 2006-01-13 | 2007-07-19 | Fortinet, Inc. | Computerized system and method for handling network traffic |
US20110219086A1 (en) * | 2006-03-01 | 2011-09-08 | Fortinet, Inc. | Electronic message and data tracking system |
US8582498B2 (en) | 2006-03-07 | 2013-11-12 | Sandwave Ip, Llc | Service subscription using geophysical location |
US20070213049A1 (en) * | 2006-03-07 | 2007-09-13 | Mediacell Licensing Corp | Service Subscription Using Geophysical Location |
US11650857B2 (en) | 2006-03-16 | 2023-05-16 | Iii Holdings 12, Llc | System and method for managing a hybrid computer environment |
US10445146B2 (en) | 2006-03-16 | 2019-10-15 | Iii Holdings 12, Llc | System and method for managing a hybrid compute environment |
US10977090B2 (en) | 2006-03-16 | 2021-04-13 | Iii Holdings 12, Llc | System and method for managing a hybrid compute environment |
US20070230470A1 (en) * | 2006-03-28 | 2007-10-04 | Redeye Networks, Inc. | Virtual collapsed backbone network architecture |
US20090049161A1 (en) * | 2006-03-29 | 2009-02-19 | Fujitsu Limited | Server management program in network system |
US20070271543A1 (en) * | 2006-05-16 | 2007-11-22 | Alpert Charles J | Buffer Insertion to Reduce Wirelength in VLSI Circuits |
US7484199B2 (en) * | 2006-05-16 | 2009-01-27 | International Business Machines Corporation | Buffer insertion to reduce wirelength in VLSI circuits |
US8862996B1 (en) * | 2006-06-29 | 2014-10-14 | Emc Corporation | Method and apparatus for container mapping presentation of distributed systems |
US7916682B2 (en) * | 2006-07-14 | 2011-03-29 | Symbol Technologies, Inc. | Wireless switch network architecture implementing layer 3 mobility domains |
US20080013474A1 (en) * | 2006-07-14 | 2008-01-17 | Symbol Technologies, Inc. | Wireless switch network architecture implementing layer 3 mobility domains |
US7856386B2 (en) | 2006-09-07 | 2010-12-21 | Yodlee, Inc. | Host exchange in bill paying services |
US20080133719A1 (en) * | 2006-11-30 | 2008-06-05 | Ofer Amitai | System and method of changing a network designation in response to data received from a device |
US8102860B2 (en) | 2006-11-30 | 2012-01-24 | Access Layers Ltd. | System and method of changing a network designation in response to data received from a device |
US20080159260A1 (en) * | 2006-12-15 | 2008-07-03 | Brocade Communications Systems, Inc. | Fibre channel over ethernet frame |
US20080159277A1 (en) * | 2006-12-15 | 2008-07-03 | Brocade Communications Systems, Inc. | Ethernet over fibre channel |
US20080181243A1 (en) * | 2006-12-15 | 2008-07-31 | Brocade Communications Systems, Inc. | Ethernet forwarding in high performance fabrics |
US8561166B2 (en) * | 2007-01-07 | 2013-10-15 | Alcatel Lucent | Efficient implementation of security applications in a networked environment |
US20080168549A1 (en) * | 2007-01-07 | 2008-07-10 | Netdevices Inc. | Efficient Implementation of Security Applications in a Networked Environment |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US11809174B2 (en) | 2007-02-28 | 2023-11-07 | Icontrol Networks, Inc. | Method and system for managing communication connectivity |
US20090190588A1 (en) * | 2007-03-08 | 2009-07-30 | Infineon Technologies Ag | Data Packet Switching |
US8527674B2 (en) * | 2007-03-08 | 2013-09-03 | Lantiq Deutschland Gmbh | Data packet switching |
US11663902B2 (en) | 2007-04-23 | 2023-05-30 | Icontrol Networks, Inc. | Method and system for providing alternate network access |
US11722896B2 (en) * | 2007-06-12 | 2023-08-08 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11632308B2 (en) | 2007-06-12 | 2023-04-18 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US20220217537A1 (en) * | 2007-06-12 | 2022-07-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11625161B2 (en) | 2007-06-12 | 2023-04-11 | Icontrol Networks, Inc. | Control system user interface |
US11894986B2 (en) | 2007-06-12 | 2024-02-06 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US8125991B1 (en) * | 2007-07-31 | 2012-02-28 | Hewlett-Packard Development Company, L.P. | Network switch using managed addresses for fast route lookup |
US11815969B2 (en) | 2007-08-10 | 2023-11-14 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US11522952B2 (en) | 2007-09-24 | 2022-12-06 | The Research Foundation For The State University Of New York | Automatic clustering for self-organizing grids |
US20090080419A1 (en) * | 2007-09-26 | 2009-03-26 | Kutch Patrick G | Providing consistent manageability interface to a management controller for local and remote connections |
US8788651B1 (en) | 2007-09-28 | 2014-07-22 | Ciena Corporation | Multi-stage value retrieval and multi-rate value retrieval |
US7720940B1 (en) * | 2007-09-28 | 2010-05-18 | World Wide Packets, Inc. | Managing a network element using a template configuration |
US8583780B2 (en) | 2007-11-20 | 2013-11-12 | Brocade Communications Systems, Inc. | Discovery of duplicate address in a network by reviewing discovery frames received at a port |
US20090132701A1 (en) * | 2007-11-20 | 2009-05-21 | Robert Snively | Duplicate address discovery and action |
US8885634B2 (en) * | 2007-11-30 | 2014-11-11 | Ciena Corporation | Systems and methods for carrier ethernet using referential tables for forwarding decisions |
US20090141703A1 (en) * | 2007-11-30 | 2009-06-04 | Morteza Ghodrat | Systems and methods for carrier ethernet using referential tables for forwarding decisions |
EP2066081A1 (en) * | 2007-11-30 | 2009-06-03 | Ciena Corporation | Flow control using referential tables in a carrier ethernet network |
US20090292813A1 (en) * | 2007-12-17 | 2009-11-26 | Brocade Communications Systems, Inc. | Address Assignment in Fibre Channel Over Ethernet Environments |
US8108454B2 (en) | 2007-12-17 | 2012-01-31 | Brocade Communications Systems, Inc. | Address assignment in Fibre Channel over Ethernet environments |
US8200798B2 (en) * | 2007-12-29 | 2012-06-12 | Cisco Technology, Inc. | Address security in a routed access network |
US20090172156A1 (en) * | 2007-12-29 | 2009-07-02 | Cisco Technology, Inc. | Address security in a routed access network |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US20150172106A1 (en) * | 2008-03-17 | 2015-06-18 | Microsoft Technology Licensing, Llc | Virtualization of groups of devices |
US20090248389A1 (en) * | 2008-03-31 | 2009-10-01 | Sony Corporation | Electronic device for emulating other electronic devices and method for operating an electronic device |
US8650274B2 (en) * | 2008-03-31 | 2014-02-11 | Fujitsu Limited | Virtual integrated management device for performing information update process for device configuration information management device |
US20110004675A1 (en) * | 2008-03-31 | 2011-01-06 | Fujitsu Limited | Virtual integrated management device for performing information update process for device configuration information management device |
US8396053B2 (en) * | 2008-04-24 | 2013-03-12 | International Business Machines Corporation | Method and apparatus for VLAN-based selective path routing |
US20090268737A1 (en) * | 2008-04-24 | 2009-10-29 | James Ryan Giles | Method and Apparatus for VLAN-Based Selective Path Routing |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
US20120227041A1 (en) * | 2008-05-23 | 2012-09-06 | Vmware, Inc. | Management of distributed virtual switch and distributed virtual ports |
US11757797B2 (en) * | 2008-05-23 | 2023-09-12 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US10637803B2 (en) * | 2008-05-23 | 2020-04-28 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US20180167339A1 (en) * | 2008-05-23 | 2018-06-14 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US20220086106A1 (en) * | 2008-05-23 | 2022-03-17 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US9160612B2 (en) * | 2008-05-23 | 2015-10-13 | Vmware, Inc. | Management of distributed virtual switch and distributed virtual ports |
US9838339B2 (en) | 2008-05-23 | 2017-12-05 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US20090296726A1 (en) * | 2008-06-03 | 2009-12-03 | Brocade Communications Systems, Inc. | ACCESS CONTROL LIST MANAGEMENT IN AN FCoE ENVIRONMENT |
US20090310535A1 (en) * | 2008-06-13 | 2009-12-17 | Nortel Networks Limited | Unifying Virtualizations in a Core Network and a Wireless Access Network |
US9131366B2 (en) * | 2008-06-13 | 2015-09-08 | Avaya Inc. | Unifying virtualizations in a core network and a wireless access network |
US20090319652A1 (en) * | 2008-06-24 | 2009-12-24 | Lsi Corporation | Method, apparatus and system for serial attached scsi (sas) domain management |
US8224944B2 (en) * | 2008-06-24 | 2012-07-17 | Lsi Corporation | Method, apparatus and system for serial attached SCSI (SAS) domain management |
US11816323B2 (en) | 2008-06-25 | 2023-11-14 | Icontrol Networks, Inc. | Automation system user interface |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11711234B2 (en) | 2008-08-11 | 2023-07-25 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11641391B2 (en) | 2008-08-11 | 2023-05-02 | Icontrol Networks Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11616659B2 (en) | 2008-08-11 | 2023-03-28 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US8826138B1 (en) * | 2008-10-29 | 2014-09-02 | Hewlett-Packard Development Company, L.P. | Virtual connect domain groups |
US8054780B1 (en) * | 2008-12-09 | 2011-11-08 | Sprint Spectrum L.P. | Transparent application data notification during IMS registrations |
US20100145760A1 (en) * | 2008-12-10 | 2010-06-10 | William Cambre | Methods and apparatus to process network access service orders |
US8615556B1 (en) * | 2008-12-30 | 2013-12-24 | Symantec Corporation | Techniques for reducing broadcast messages |
US20100177787A1 (en) * | 2009-01-12 | 2010-07-15 | Trane International Inc. | System and Method for Extending Communication Protocols |
US8306064B2 (en) * | 2009-01-12 | 2012-11-06 | Trane International Inc. | System and method for extending communication protocols |
US20100214950A1 (en) * | 2009-02-23 | 2010-08-26 | Brocade Communications Systems, Inc. | High availability and multipathing for fibre channel over ethernet |
US8848575B2 (en) | 2009-02-23 | 2014-09-30 | Brocade Communications Systems, Inc. | High availability and multipathing for fibre channel over ethernet |
US8555359B2 (en) | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
US20100235873A1 (en) * | 2009-03-13 | 2010-09-16 | Kiyotaka Tsuji | Video server apparatus |
US8863203B2 (en) * | 2009-03-13 | 2014-10-14 | Kabushiki Kaisha Toshiba | Video server apparatus |
US20100246388A1 (en) * | 2009-03-26 | 2010-09-30 | Brocade Communications Systems, Inc. | Redundant host connection in a routed network |
US9019976B2 (en) | 2009-03-26 | 2015-04-28 | Brocade Communication Systems, Inc. | Redundant host connection in a routed network |
US8665886B2 (en) | 2009-03-26 | 2014-03-04 | Brocade Communications Systems, Inc. | Redundant host connection in a routed network |
US11856502B2 (en) | 2009-04-30 | 2023-12-26 | Icontrol Networks, Inc. | Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises |
US11778534B2 (en) | 2009-04-30 | 2023-10-03 | Icontrol Networks, Inc. | Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces |
US11601865B2 (en) | 2009-04-30 | 2023-03-07 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
US11665617B2 (en) | 2009-04-30 | 2023-05-30 | Icontrol Networks, Inc. | Server-based notification of alarm event subsequent to communication failure with armed security system |
CH701294A1 (en) * | 2009-06-18 | 2010-12-31 | Archimede Solutions Sarl | multi-protocol system monitoring and management of heterogeneous smart objects. |
US20110053623A1 (en) * | 2009-09-03 | 2011-03-03 | Cisco Technology, Inc. | Hfc banding for a virtual service group |
US8413241B2 (en) * | 2009-09-17 | 2013-04-02 | Oracle America, Inc. | Integrated intrusion deflection, detection and introspection |
US20110067107A1 (en) * | 2009-09-17 | 2011-03-17 | Sun Microsystems, Inc. | Integrated intrusion deflection, detection and introspection |
US11671283B2 (en) | 2009-09-24 | 2023-06-06 | Zoom Video Communications, Inc. | Configuring a packet to include a virtual machine identifier |
US10812293B2 (en) | 2009-09-24 | 2020-10-20 | Nec Corporation | System and method for identifying communication between virtual servers |
US9385888B2 (en) | 2009-09-24 | 2016-07-05 | Nec Corporation | System and method for identifying communication between virtual servers |
EP2482496A4 (en) * | 2009-09-24 | 2015-07-29 | Nec Corp | Identification system for inter-virtual-server communication and identification method for inter-virtual-server communication |
US9774473B2 (en) | 2009-09-24 | 2017-09-26 | Nec Corporation | System and method for identifying communication between virtual servers |
US9391804B2 (en) | 2009-09-24 | 2016-07-12 | Nec Corporation | System and method for identifying communication between virtual servers |
US11917044B2 (en) | 2009-09-30 | 2024-02-27 | Nicira, Inc. | Private allocated networks over shared communications infrastructure |
US11526304B2 (en) | 2009-10-30 | 2022-12-13 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US11720290B2 (en) | 2009-10-30 | 2023-08-08 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US9219679B2 (en) | 2009-12-07 | 2015-12-22 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US8117289B1 (en) | 2009-12-07 | 2012-02-14 | Amazon Technologies, Inc. | Using virtual networking devices to manage substrate devices |
US9769021B2 (en) | 2009-12-07 | 2017-09-19 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US9036504B1 (en) | 2009-12-07 | 2015-05-19 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US11870644B2 (en) | 2009-12-07 | 2024-01-09 | Amazon Technologies, Inc. | Exchange of routing information to support virtual computer networks hosted on telecommunications infrastructure network |
US10868723B2 (en) | 2009-12-07 | 2020-12-15 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US8392608B1 (en) | 2009-12-07 | 2013-03-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US11516080B2 (en) | 2009-12-07 | 2022-11-29 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US9722871B2 (en) | 2009-12-07 | 2017-08-01 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US9900214B2 (en) | 2009-12-07 | 2018-02-20 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US8995301B1 (en) * | 2009-12-07 | 2015-03-31 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing cost information |
US10225146B2 (en) | 2009-12-07 | 2019-03-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing information |
US10419287B2 (en) | 2009-12-07 | 2019-09-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to associate network addresses with computing nodes |
US9203747B1 (en) | 2009-12-07 | 2015-12-01 | Amazon Technologies, Inc. | Providing virtual networking device functionality for managed computer networks |
US9998335B2 (en) | 2009-12-07 | 2018-06-12 | Amazon Technologies, Inc. | Emulating virtual router device functionality in virtual computer networks |
US9210041B1 (en) | 2009-12-07 | 2015-12-08 | Amazon Technologies, Inc. | Using virtual networking devices to manage network configuration |
US9794344B2 (en) | 2009-12-18 | 2017-10-17 | International Business Machines Corporation | Handling of data transfer in a LAN-free environment |
US8639769B2 (en) * | 2009-12-18 | 2014-01-28 | International Business Machines Corporation | Handling of data transfer in a LAN-free environment |
US20110153730A1 (en) * | 2009-12-18 | 2011-06-23 | International Business Machines Corporation | Handling of data transfer in a lan-free environment |
US9122640B2 (en) | 2009-12-18 | 2015-09-01 | International Business Machines Corporation | Handling of data transfer in a LAN-free environment |
US9288267B2 (en) | 2009-12-18 | 2016-03-15 | International Business Machines Corporation | Handling of data transfer in a LAN-free environment |
US8224971B1 (en) | 2009-12-28 | 2012-07-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US9497040B1 (en) | 2009-12-28 | 2016-11-15 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
US8370488B1 (en) | 2009-12-28 | 2013-02-05 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US9467398B2 (en) | 2009-12-28 | 2016-10-11 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US9094421B1 (en) | 2009-12-28 | 2015-07-28 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US9577876B2 (en) | 2009-12-28 | 2017-02-21 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US9137102B1 (en) | 2009-12-28 | 2015-09-15 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US8131852B1 (en) | 2009-12-28 | 2012-03-06 | Amazon Technologies, Inc. | Using virtual networking devices to manage routing communications between connected computer networks |
US8312129B1 (en) | 2009-12-28 | 2012-11-13 | Amazon Technologies, Inc. | Using virtual networking devices to connect managed computer networks |
US8995444B2 (en) | 2010-03-24 | 2015-03-31 | Brocade Communication Systems, Inc. | Method and system for extending routing domain to non-routing end stations |
US8867552B2 (en) | 2010-05-03 | 2014-10-21 | Brocade Communications Systems, Inc. | Virtual cluster switching |
US10673703B2 (en) | 2010-05-03 | 2020-06-02 | Avago Technologies International Sales Pte. Limited | Fabric switching |
US9628336B2 (en) | 2010-05-03 | 2017-04-18 | Brocade Communications Systems, Inc. | Virtual cluster switching |
US8625616B2 (en) | 2010-05-11 | 2014-01-07 | Brocade Communications Systems, Inc. | Converged network extension |
US9001824B2 (en) * | 2010-05-18 | 2015-04-07 | Brocade Communication Systems, Inc. | Fabric formation for virtual cluster switching |
US20110286357A1 (en) * | 2010-05-18 | 2011-11-24 | Brocade Communications Systems, Inc. | Fabric formation for virtual cluster switching |
US9485148B2 (en) | 2010-05-18 | 2016-11-01 | Brocade Communications Systems, Inc. | Fabric formation for virtual cluster switching |
US20110289193A1 (en) * | 2010-05-20 | 2011-11-24 | Jae Hoon Kim | Method of controlling mobile terminal, home hub, and visited hub in virtual group for content sharing |
US8782172B2 (en) * | 2010-05-20 | 2014-07-15 | Samsung Electronics Co., Ltd. | Method of controlling mobile terminal, home hub, and visited hub in virtual group for content sharing |
US9942173B2 (en) | 2010-05-28 | 2018-04-10 | Brocade Communications System Llc | Distributed configuration management for virtual cluster switching |
US9716672B2 (en) | 2010-05-28 | 2017-07-25 | Brocade Communications Systems, Inc. | Distributed configuration management for virtual cluster switching |
US9461840B2 (en) | 2010-06-02 | 2016-10-04 | Brocade Communications Systems, Inc. | Port profile management for virtual cluster switching |
US8634308B2 (en) | 2010-06-02 | 2014-01-21 | Brocade Communications Systems, Inc. | Path detection in trill networks |
US8885488B2 (en) | 2010-06-02 | 2014-11-11 | Brocade Communication Systems, Inc. | Reachability detection in trill networks |
US9077559B2 (en) | 2010-06-03 | 2015-07-07 | Fujitsu Limited | Switching apparatus and method for setting up virtual LAN |
US11757705B2 (en) | 2010-06-07 | 2023-09-12 | Avago Technologies International Sales Pte. Limited | Advanced link tracking for virtual cluster switching |
US11438219B2 (en) | 2010-06-07 | 2022-09-06 | Avago Technologies International Sales Pte. Limited | Advanced link tracking for virtual cluster switching |
US9769016B2 (en) | 2010-06-07 | 2017-09-19 | Brocade Communications Systems, Inc. | Advanced link tracking for virtual cluster switching |
US9270486B2 (en) | 2010-06-07 | 2016-02-23 | Brocade Communications Systems, Inc. | Name services for virtual cluster switching |
US9848040B2 (en) | 2010-06-07 | 2017-12-19 | Brocade Communications Systems, Inc. | Name services for virtual cluster switching |
US10419276B2 (en) | 2010-06-07 | 2019-09-17 | Avago Technologies International Sales Pte. Limited | Advanced link tracking for virtual cluster switching |
US10924333B2 (en) | 2010-06-07 | 2021-02-16 | Avago Technologies International Sales Pte. Limited | Advanced link tracking for virtual cluster switching |
US20110299534A1 (en) * | 2010-06-08 | 2011-12-08 | Brocade Communications Systems, Inc. | Virtual port grouping for virtual cluster switching |
US8446914B2 (en) | 2010-06-08 | 2013-05-21 | Brocade Communications Systems, Inc. | Method and system for link aggregation across multiple switches |
US8989186B2 (en) * | 2010-06-08 | 2015-03-24 | Brocade Communication Systems, Inc. | Virtual port grouping for virtual cluster switching |
US9246703B2 (en) | 2010-06-08 | 2016-01-26 | Brocade Communications Systems, Inc. | Remote port mirroring |
US9608833B2 (en) | 2010-06-08 | 2017-03-28 | Brocade Communications Systems, Inc. | Supporting multiple multicast trees in trill networks |
US9628293B2 (en) | 2010-06-08 | 2017-04-18 | Brocade Communications Systems, Inc. | Network layer multicasting in trill networks |
US9231890B2 (en) | 2010-06-08 | 2016-01-05 | Brocade Communications Systems, Inc. | Traffic management for virtual cluster switching |
US9455935B2 (en) | 2010-06-08 | 2016-09-27 | Brocade Communications Systems, Inc. | Remote port mirroring |
US9461911B2 (en) | 2010-06-08 | 2016-10-04 | Brocade Communications Systems, Inc. | Virtual port grouping for virtual cluster switching |
US9143445B2 (en) | 2010-06-08 | 2015-09-22 | Brocade Communications Systems, Inc. | Method and system for link aggregation across multiple switches |
US9806906B2 (en) | 2010-06-08 | 2017-10-31 | Brocade Communications Systems, Inc. | Flooding packets on a per-virtual-network basis |
US9807031B2 (en) | 2010-07-16 | 2017-10-31 | Brocade Communications Systems, Inc. | System and method for network configuration |
US10348643B2 (en) | 2010-07-16 | 2019-07-09 | Avago Technologies International Sales Pte. Limited | System and method for network configuration |
US8423632B2 (en) * | 2010-09-20 | 2013-04-16 | Huawei Technologies Co., Ltd. | Method, network management center, and a related device for configuring a network policy for a virtual port |
US20130031235A1 (en) * | 2010-09-20 | 2013-01-31 | Huawei Technologies Co., Ltd. | Method, network management center, and a related device for configuring a network policy for a virtual port |
US11900790B2 (en) | 2010-09-28 | 2024-02-13 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US8335841B2 (en) | 2010-09-30 | 2012-12-18 | Microsoft Corporation | Logical networks |
US8977726B2 (en) | 2010-09-30 | 2015-03-10 | Microsoft Technology Licensing, Llc | Logical networks |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9571337B1 (en) * | 2010-12-22 | 2017-02-14 | Juniper Networks, Inc. | Deriving control plane connectivity during provisioning of a distributed control plane of a switch |
US9154425B2 (en) | 2011-03-07 | 2015-10-06 | Broadcom Corporation | Method and apparatus for routing in a single tier switched network |
TWI617179B (en) * | 2011-03-07 | 2018-03-01 | 安華高科技通用Ip(新加坡)公司 | Method and apparatus for routing in a single tier switched network |
US20120230342A1 (en) * | 2011-03-07 | 2012-09-13 | Broadcom Corporation | Method and apparatus for routing in a single tier switched network |
US8705544B2 (en) * | 2011-03-07 | 2014-04-22 | Broadcom Corporation | Method and apparatus for routing in a single tier switched network |
US8832489B2 (en) * | 2011-04-26 | 2014-09-09 | Dell Products, Lp | System and method for providing failover between controllers in a storage array |
US20120278652A1 (en) * | 2011-04-26 | 2012-11-01 | Dell Products, Lp | System and Method for Providing Failover Between Controllers in a Storage Array |
US9270572B2 (en) | 2011-05-02 | 2016-02-23 | Brocade Communications Systems Inc. | Layer-3 support in TRILL networks |
US8914467B2 (en) | 2011-05-23 | 2014-12-16 | Fujitsu Limited | Information processing apparatus, system, and storage medium |
US9647854B1 (en) | 2011-06-28 | 2017-05-09 | Gogrid, LLC | System and method for configuring and managing virtual grids |
US9350564B2 (en) | 2011-06-28 | 2016-05-24 | Brocade Communications Systems, Inc. | Spanning-tree based loop detection for an ethernet fabric switch |
US8880657B1 (en) * | 2011-06-28 | 2014-11-04 | Gogrid, LLC | System and method for configuring and managing virtual grids |
US8879549B2 (en) | 2011-06-28 | 2014-11-04 | Brocade Communications Systems, Inc. | Clearing forwarding entries dynamically and ensuring consistency of tables across ethernet fabric switch |
US8948056B2 (en) | 2011-06-28 | 2015-02-03 | Brocade Communication Systems, Inc. | Spanning-tree based loop detection for an ethernet fabric switch |
US9401861B2 (en) | 2011-06-28 | 2016-07-26 | Brocade Communications Systems, Inc. | Scalable MAC address distribution in an Ethernet fabric switch |
US9407533B2 (en) | 2011-06-28 | 2016-08-02 | Brocade Communications Systems, Inc. | Multicast in a trill network |
US9007958B2 (en) | 2011-06-29 | 2015-04-14 | Brocade Communication Systems, Inc. | External loop detection for an ethernet fabric switch |
US8885641B2 (en) | 2011-06-30 | 2014-11-11 | Brocade Communication Systems, Inc. | Efficient trill forwarding |
US9112817B2 (en) | 2011-06-30 | 2015-08-18 | Brocade Communications Systems, Inc. | Efficient TRILL forwarding |
US9577871B2 (en) * | 2011-07-21 | 2017-02-21 | Huawei Technologies Co., Ltd. | Method and device of interface registration for a network device to join in a cluster system |
US20140136677A1 (en) * | 2011-07-21 | 2014-05-15 | Huawei Technologies Co., Ltd. | Method and device of interface registration for a network device to join in a cluster system |
US20130041976A1 (en) * | 2011-08-12 | 2013-02-14 | Microsoft Corporation | Context-aware delivery of content |
US9736085B2 (en) | 2011-08-29 | 2017-08-15 | Brocade Communications Systems, Inc. | End-to end lossless Ethernet in Ethernet fabric |
US20140222961A1 (en) * | 2011-09-12 | 2014-08-07 | Sharp Kabushiki Kaisha | Reproduction apparatus, reproduction method, distribution apparatus, distribution system, reproduction program, and storage medium |
US9699117B2 (en) | 2011-11-08 | 2017-07-04 | Brocade Communications Systems, Inc. | Integrated fibre channel support in an ethernet fabric switch |
US10164883B2 (en) | 2011-11-10 | 2018-12-25 | Avago Technologies International Sales Pte. Limited | System and method for flow management in software-defined networks |
US9450870B2 (en) | 2011-11-10 | 2016-09-20 | Brocade Communications Systems, Inc. | System and method for flow management in software-defined networks |
US9729387B2 (en) | 2012-01-26 | 2017-08-08 | Brocade Communications Systems, Inc. | Link aggregation in software-defined networks |
US8995272B2 (en) | 2012-01-26 | 2015-03-31 | Brocade Communication Systems, Inc. | Link aggregation in software-defined networks |
US9244828B2 (en) * | 2012-02-15 | 2016-01-26 | Advanced Micro Devices, Inc. | Allocating memory and using the allocated memory in a workgroup in a dispatched data parallel kernel |
US20150033321A1 (en) * | 2012-02-15 | 2015-01-29 | Hangzhou H3C Technologies Co., Ltd. | Construct large-scale dvpn |
US20130212350A1 (en) * | 2012-02-15 | 2013-08-15 | Advanced Micro Devices, Inc. | Abstracting scratch pad memories as distributed arrays |
US20130218347A1 (en) * | 2012-02-22 | 2013-08-22 | Eunhwa JUNG | Building automation and control system and method for operating the same |
US9465371B2 (en) * | 2012-02-22 | 2016-10-11 | Lg Electronics Inc. | Building automation and control system and method for operating the same |
US9137118B2 (en) * | 2012-02-27 | 2015-09-15 | Hitachi, Ltd. | Management server and management method |
US9742693B2 (en) | 2012-02-27 | 2017-08-22 | Brocade Communications Systems, Inc. | Dynamic service insertion in a fabric switch |
US20140010109A1 (en) * | 2012-02-27 | 2014-01-09 | Hitachi, Ltd. | Management server and management method |
US9816718B2 (en) * | 2012-03-14 | 2017-11-14 | Mitsubishi Electric Corporation | Control device, air conditioning system, and equipment system |
US20150120003A1 (en) * | 2012-03-14 | 2015-04-30 | Mitsubishi Electric Corporation | Control device, air conditioning system, and equipment system |
US9887916B2 (en) | 2012-03-22 | 2018-02-06 | Brocade Communications Systems LLC | Overlay tunnel in a fabric switch |
US9154416B2 (en) | 2012-03-22 | 2015-10-06 | Brocade Communications Systems, Inc. | Overlay tunnel in a fabric switch |
US20220141158A1 (en) * | 2012-05-16 | 2022-05-05 | Vmware, Inc. | Configuration management of distributed virtual switch |
US20160191427A1 (en) * | 2012-05-16 | 2016-06-30 | Vmware, Inc. | Configuration management of distributed virtual switch |
US20130308492A1 (en) * | 2012-05-16 | 2013-11-21 | Vmware, Inc. | Configuration Management of Distributed Virtual Switch |
US11038818B2 (en) * | 2012-05-16 | 2021-06-15 | Vmware, Inc. | Configuration management of distributed virtual switch |
US9019977B2 (en) * | 2012-05-16 | 2015-04-28 | Vmware, Inc. | Configuration management of distributed virtual switch |
US9374301B2 (en) | 2012-05-18 | 2016-06-21 | Brocade Communications Systems, Inc. | Network feedback in software-defined networks |
US9998365B2 (en) | 2012-05-18 | 2018-06-12 | Brocade Communications Systems, LLC | Network feedback in software-defined networks |
US10277464B2 (en) | 2012-05-22 | 2019-04-30 | Arris Enterprises Llc | Client auto-configuration in a multi-switch link aggregation |
US10454760B2 (en) | 2012-05-23 | 2019-10-22 | Avago Technologies International Sales Pte. Limited | Layer-3 overlay gateways |
US10111053B2 (en) | 2012-07-31 | 2018-10-23 | Hewlett Packard Enterprise Development Lp | Overlaying virtual broadcast domains on an underlying physical network |
US9344858B2 (en) * | 2012-07-31 | 2016-05-17 | Aruba Networks, Inc. | Overlaying virtual broadcast domains on an underlying physical network |
US20140321445A1 (en) * | 2012-07-31 | 2014-10-30 | Aruba Networks, Inc. | Overlaying Virtual Broadcast Domains On An Underlying Physical Network |
US9602430B2 (en) | 2012-08-21 | 2017-03-21 | Brocade Communications Systems, Inc. | Global VLANs for fabric switches |
US20140119239A1 (en) * | 2012-10-30 | 2014-05-01 | Ciena Corporation | Systems and methods for constrained forwarding based packet network connectivity |
US8929254B2 (en) * | 2012-10-30 | 2015-01-06 | Ciena Corporation | Systems and methods for constrained forwarding based packet network connectivity |
US9401872B2 (en) | 2012-11-16 | 2016-07-26 | Brocade Communications Systems, Inc. | Virtual link aggregations across multiple fabric switches |
US10075394B2 (en) | 2012-11-16 | 2018-09-11 | Brocade Communications Systems LLC | Virtual link aggregations across multiple fabric switches |
US10447783B2 (en) * | 2012-11-28 | 2019-10-15 | Nomad Digital Limited | Communication method |
CN103873337B (en) * | 2012-12-12 | 2017-08-04 | 思科技术公司 | The method and apparatus of flexible and expansible virtual network segment trimming |
CN103873337A (en) * | 2012-12-12 | 2014-06-18 | 思科技术公司 | Flexible and scalable virtual network segment pruning method and device |
WO2014093630A1 (en) * | 2012-12-12 | 2014-06-19 | Cisco Technology, Inc. | Flexible and scalable virtual network segment pruning |
US9143442B2 (en) | 2012-12-12 | 2015-09-22 | Cisco Technology, Inc. | Flexible and scalable virtual network segment pruning |
US20140177454A1 (en) * | 2012-12-21 | 2014-06-26 | Ixia | Methods, systems, and computer readable media for effecting movement of virtual switch interfaces between virtual switches connected to different physical ports of a device under test |
US9071548B2 (en) * | 2012-12-21 | 2015-06-30 | Ixia | Methods, systems, and computer readable media for effecting movement of virtual switch interfaces between virtual switches connected to different physical ports of a device under test |
US9807017B2 (en) | 2013-01-11 | 2017-10-31 | Brocade Communications Systems, Inc. | Multicast traffic load balancing over virtual link aggregation |
US9774543B2 (en) | 2013-01-11 | 2017-09-26 | Brocade Communications Systems, Inc. | MAC address synchronization in a fabric switch |
US9350680B2 (en) | 2013-01-11 | 2016-05-24 | Brocade Communications Systems, Inc. | Protection switching over a virtual link aggregation |
US9660939B2 (en) | 2013-01-11 | 2017-05-23 | Brocade Communications Systems, Inc. | Protection switching over a virtual link aggregation |
US9413691B2 (en) | 2013-01-11 | 2016-08-09 | Brocade Communications Systems, Inc. | MAC address synchronization in a fabric switch |
US9548926B2 (en) | 2013-01-11 | 2017-01-17 | Brocade Communications Systems, Inc. | Multicast traffic load balancing over virtual link aggregation |
US9565113B2 (en) | 2013-01-15 | 2017-02-07 | Brocade Communications Systems, Inc. | Adaptive link aggregation and virtual link aggregation |
US20160006646A1 (en) * | 2013-02-26 | 2016-01-07 | Hangzhou H3C Technologies Co., Ltd. | Multicasting a data message in a multi-site network |
US9871721B2 (en) * | 2013-02-26 | 2018-01-16 | Hewlett Packard Enterprise Development Lp | Multicasting a data message in a multi-site network |
US9565099B2 (en) | 2013-03-01 | 2017-02-07 | Brocade Communications Systems, Inc. | Spanning tree in fabric switches |
US10462049B2 (en) | 2013-03-01 | 2019-10-29 | Avago Technologies International Sales Pte. Limited | Spanning tree in fabric switches |
US9871676B2 (en) | 2013-03-15 | 2018-01-16 | Brocade Communications Systems LLC | Scalable gateways for a fabric switch |
US9401818B2 (en) | 2013-03-15 | 2016-07-26 | Brocade Communications Systems, Inc. | Scalable gateways for a fabric switch |
US9565028B2 (en) | 2013-06-10 | 2017-02-07 | Brocade Communications Systems, Inc. | Ingress switch multicast distribution in a fabric switch |
US9699001B2 (en) | 2013-06-10 | 2017-07-04 | Brocade Communications Systems, Inc. | Scalable and segregated network virtualization |
US20140371876A1 (en) * | 2013-06-18 | 2014-12-18 | NuLEDs, Inc. | Controlling loads and collecting building information via ip networks |
US20190056703A1 (en) * | 2013-06-18 | 2019-02-21 | Chris A. Isaacson | Controlling Loads and Collecting Building Information via IP Networks |
US10684597B2 (en) * | 2013-06-18 | 2020-06-16 | NuLEDs, Inc. | Controlling loads and collecting building information via IP networks |
US10025279B2 (en) * | 2013-06-18 | 2018-07-17 | NuLEDs, Inc. | Controlling loads and collecting building information via IP networks |
US9806949B2 (en) | 2013-09-06 | 2017-10-31 | Brocade Communications Systems, Inc. | Transparent interconnection of Ethernet fabric switches |
US10375047B2 (en) * | 2013-09-30 | 2019-08-06 | Schneider Electric Industries Sas | Cloud-authenticated site resource management devices, apparatuses, methods and systems |
CN111667384A (en) * | 2013-09-30 | 2020-09-15 | 施耐德电气工业简易股份公司 | Building automation management device and method |
EP3941024A1 (en) * | 2013-09-30 | 2022-01-19 | Schneider Electric Buildings, LLC | Building automation management device, associated method and computer program |
US10819692B2 (en) * | 2013-09-30 | 2020-10-27 | Schneider Electric Buildings, Llc | Cloud-authenticated site resource management devices, apparatuses, methods and systems |
US11277395B2 (en) | 2013-09-30 | 2022-03-15 | Schneider Electric Buildings, Llc | Cloud-authenticated site resource management devices, apparatuses, methods and systems |
CN104579732A (en) * | 2013-10-21 | 2015-04-29 | 华为技术有限公司 | Method, device and system for managing virtualized network function network elements |
EP3046288A4 (en) * | 2013-10-21 | 2016-07-20 | Huawei Tech Co Ltd | Virtual network function network elements management method, device and system |
US11223541B2 (en) | 2013-10-21 | 2022-01-11 | Huawei Technologies Co., Ltd. | Virtual network function network element management method, apparatus, and system |
CN104579732B (en) * | 2013-10-21 | 2018-06-26 | 华为技术有限公司 | Virtualize management method, the device and system of network function network element |
US9621744B2 (en) * | 2013-10-28 | 2017-04-11 | Canon Kabushiki Kaisha | Image processing apparatus, method of controlling the same and storage medium |
US9912612B2 (en) | 2013-10-28 | 2018-03-06 | Brocade Communications Systems LLC | Extended ethernet fabric switches |
US20150116786A1 (en) * | 2013-10-28 | 2015-04-30 | Canon Kabushiki Kaisha | Image processing apparatus, method of controlling the same and storage medium |
US10355879B2 (en) | 2014-02-10 | 2019-07-16 | Avago Technologies International Sales Pte. Limited | Virtual extensible LAN tunnel keepalives |
US9548873B2 (en) | 2014-02-10 | 2017-01-17 | Brocade Communications Systems, Inc. | Virtual extensible LAN tunnel keepalives |
US9825822B1 (en) * | 2014-02-13 | 2017-11-21 | Amazon Technologies, Inc. | Group networking in an overlay network |
US11943301B2 (en) | 2014-03-03 | 2024-03-26 | Icontrol Networks, Inc. | Media content management |
EP3116173A4 (en) * | 2014-03-04 | 2017-10-25 | Nec Corporation | Server, control device, management device, communication system, communication method, control method, management method, and program |
US10581758B2 (en) | 2014-03-19 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Distributed hot standby links for vLAG |
US10476698B2 (en) | 2014-03-20 | 2019-11-12 | Avago Technologies International Sales Pte. Limited | Redundent virtual link aggregation group |
US10063473B2 (en) | 2014-04-30 | 2018-08-28 | Brocade Communications Systems LLC | Method and system for facilitating switch virtualization in a network of interconnected switches |
US10044568B2 (en) | 2014-05-13 | 2018-08-07 | Brocade Communications Systems LLC | Network extension groups of global VLANs in a fabric switch |
US9800471B2 (en) | 2014-05-13 | 2017-10-24 | Brocade Communications Systems, Inc. | Network extension groups of global VLANs in a fabric switch |
US20150358239A1 (en) * | 2014-06-06 | 2015-12-10 | Verizon Patent And Licensing Inc. | Network policy and network device control |
US9455923B2 (en) * | 2014-06-06 | 2016-09-27 | Verizon Patent And Licensing Inc. | Network policy and network device control |
US20160344654A1 (en) * | 2014-06-06 | 2016-11-24 | Verizon Patent And Licensing Inc. | Network policy and network device control |
US9749258B2 (en) * | 2014-06-06 | 2017-08-29 | Verizon Patent And Licensing Inc. | Network policy and network device control |
US10284485B2 (en) * | 2014-07-08 | 2019-05-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Communication nodes, methods therein, computer programs and a computer-readable storage medium |
US10616108B2 (en) | 2014-07-29 | 2020-04-07 | Avago Technologies International Sales Pte. Limited | Scalable MAC address virtualization |
US9544219B2 (en) | 2014-07-31 | 2017-01-10 | Brocade Communications Systems, Inc. | Global VLAN services |
US9807007B2 (en) | 2014-08-11 | 2017-10-31 | Brocade Communications Systems, Inc. | Progressive MAC address learning |
US10284469B2 (en) | 2014-08-11 | 2019-05-07 | Avago Technologies International Sales Pte. Limited | Progressive MAC address learning |
US9998340B2 (en) | 2014-10-07 | 2018-06-12 | At&T Intellectual Property I, L.P. | Method and system to monitor a network |
US9674057B2 (en) | 2014-10-07 | 2017-06-06 | At&T Intellectual Property I, L.P. | Method and system to monitor a network |
US9524173B2 (en) | 2014-10-09 | 2016-12-20 | Brocade Communications Systems, Inc. | Fast reboot for a switch |
US9699029B2 (en) | 2014-10-10 | 2017-07-04 | Brocade Communications Systems, Inc. | Distributed configuration management in a switch group |
US9455902B2 (en) * | 2014-10-31 | 2016-09-27 | Aruba Networks, Inc. | IGMP/MLD leave upon client disassociation or user idle timer expiry |
US20160127221A1 (en) * | 2014-10-31 | 2016-05-05 | Aruba Networks, Inc. | Igmp/mld leave upon client disassociation or user idle timer expiry |
US9626255B2 (en) | 2014-12-31 | 2017-04-18 | Brocade Communications Systems, Inc. | Online restoration of a switch snapshot |
US9628407B2 (en) | 2014-12-31 | 2017-04-18 | Brocade Communications Systems, Inc. | Multiple software versions in a switch group |
US9942097B2 (en) | 2015-01-05 | 2018-04-10 | Brocade Communications Systems LLC | Power management in a network of interconnected switches |
US10003552B2 (en) | 2015-01-05 | 2018-06-19 | Brocade Communications Systems, Llc. | Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches |
CN110221918A (en) * | 2015-01-19 | 2019-09-10 | 华为技术有限公司 | A kind of correlating method, the apparatus and system of NS and VNF |
CN110221918B (en) * | 2015-01-19 | 2023-10-10 | 华为技术有限公司 | Association method, device and system of NS and VNF |
CN115442302A (en) * | 2015-01-30 | 2022-12-06 | Nicira股份有限公司 | Logical router with multiple routing components |
US20160248726A1 (en) * | 2015-02-23 | 2016-08-25 | Red Hat Israel, Ltd. | Scoped network address pool mangement |
US10423433B2 (en) * | 2015-02-23 | 2019-09-24 | Red Hat Israel, Inc. | Scoped network address pool management |
US10038592B2 (en) | 2015-03-17 | 2018-07-31 | Brocade Communications Systems LLC | Identifier assignment to a new switch in a switch group |
US9807005B2 (en) | 2015-03-17 | 2017-10-31 | Brocade Communications Systems, Inc. | Multi-fabric manager |
US10579406B2 (en) | 2015-04-08 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Dynamic orchestration of overlay tunnels |
US10439929B2 (en) | 2015-07-31 | 2019-10-08 | Avago Technologies International Sales Pte. Limited | Graceful recovery of a multicast-enabled switch |
US10171303B2 (en) | 2015-09-16 | 2019-01-01 | Avago Technologies International Sales Pte. Limited | IP-based interconnection of switches with a logical chassis |
US9912614B2 (en) | 2015-12-07 | 2018-03-06 | Brocade Communications Systems LLC | Interconnection of switches based on hierarchical overlay tunneling |
US10237090B2 (en) | 2016-10-28 | 2019-03-19 | Avago Technologies International Sales Pte. Limited | Rule-based network identifier mapping |
US10241477B2 (en) * | 2016-11-02 | 2019-03-26 | Edison Labs, Inc. | Adaptive control methods for buildings with redundant circuitry |
EP3605346A4 (en) * | 2017-03-30 | 2020-06-10 | Nec Corporation | Control device, control system, control method and program |
US20220045938A1 (en) * | 2019-01-07 | 2022-02-10 | Nippon Telegraph And Telephone Corporation | Communication device, multicast transfer system, and multicast transfer method |
US20210314250A1 (en) * | 2019-06-11 | 2021-10-07 | Zscaler, Inc. | Auto re-segmentation to assign new applications in a microsegmented network |
US11902145B2 (en) * | 2019-06-11 | 2024-02-13 | Zscaler, Inc. | Generating and deploying security policies for microsegmentation |
US11496387B2 (en) * | 2019-06-11 | 2022-11-08 | Zscaler, Inc. | Auto re-segmentation to assign new applications in a microsegmented network |
US20230104751A1 (en) * | 2019-06-11 | 2023-04-06 | Zscaler, Inc. | Generating and deploying security policies for microsegmentation |
US11552930B2 (en) * | 2020-08-31 | 2023-01-10 | Equinix, Inc. | Virtual domains within a shared device |
US11960937B2 (en) | 2022-03-17 | 2024-04-16 | Iii Holdings 12, Llc | System and method for an optimizing reservation in time of compute resources based on prioritization function and reservation policy parameter |
US11962672B2 (en) | 2023-05-12 | 2024-04-16 | Icontrol Networks, Inc. | Virtual device systems and methods |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6085238A (en) | Virtual LAN system | |
CN105553849B (en) | A kind of traditional IP and SPTN network intercommunication method and system | |
US7242665B2 (en) | Network device virtual interface | |
CN102857494B (en) | Universal network interface controller | |
CN104702512B (en) | The multi-level control system and computer implemented method of network management are provided for software defined network | |
CN101909001B (en) | Forwarding frames in a computer network using shortest path bridging | |
CN108111383B (en) | SDN-based cross-domain container virtual network construction method | |
AU666792B2 (en) | Parallel computer system | |
CN102845035B (en) | The method on identifying purpose ground in virtual environment | |
US6639917B1 (en) | Converged service for interconnected local area networks | |
CN112187517B (en) | Configuration method, platform and controller for SDN virtual routing of data center | |
JPH04227150A (en) | Apparatus and method for assigning network addresses | |
US20020099849A1 (en) | Dense virtual router packet switching | |
JPH11511912A (en) | Extended domain computer network using standard links | |
CN102986172A (en) | Virtual cluster switching | |
CN102067533A (en) | Port grouping for association with virtual interfaces | |
WO1999013617A1 (en) | Lan emulation subsystems for supporting multiple virtual lans | |
CN108809796A (en) | A kind of Metropolitan Area Network (MAN) power system service communication means based on VxLAN | |
CN101743722B (en) | Method of connecting VLAN systems to other networks via a router | |
CA2266072C (en) | Packet filtering in connection-based switching networks | |
CN106657377B (en) | A kind of WIA-PA/ interconnects manufacture network information service adapter and implementation method entirely | |
JP3124926B2 (en) | Virtual LAN method | |
Dalal | Use of multiple networks in the Xerox network system | |
Christensen et al. | Local area networks—evolving from shared to switched access | |
CN100361473C (en) | Interconnection method between frame relay and Ethernet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MATSUSHITA ELECTRIC WORKS, LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YUASA, HIROYOSHI;SATAKE, TADASHI;CARDONA, MARIO JOSE;AND OTHERS;REEL/FRAME:008823/0597 Effective date: 19970808 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: PANASONIC ELECTRIC WORKS CO., LTD., JAPAN Free format text: CHANGE OF NAME;ASSIGNOR:MATSUSHITA ELECTRIC WORKS, LTD.;REEL/FRAME:022288/0703 Effective date: 20081001 |
|
FPAY | Fee payment |
Year of fee payment: 12 |